text stringlengths 144 682k |
|---|
Diabetes Mellitus
SKU: DIABHKPK Categories: ,
What Is Diabetes Mellitus?
Diabetes mellitus is the name of a group of metabolic disorders of the human body. It is characterized by the presence of a high level of sugar in the blood. (Mellitus is the Latin word for ‘honey’). All forms of diabetes mellitus are chronic and cannot be treated, but they can be controlled with proper care. They are not fatal conditions unless they are left unmanaged.
There are three kinds of diabetes mellitus which are called:-
• Type 1 Diabetes
• Type 2 Diabetes
• Gestational Diabetes
In all three of them the blood sugar level rises. This is because of a malfunction of the hormone insulin which is responsible for the proper breakdown of sugar in the body.
Prevalence of Diabetes Mellitus in the World
Diabetes mellitus is the most prevalent metabolic disorder in the world today. It is characterized as a lifestyle disease and it is found more commonly in the urban areas of the world where the standard of living is higher. For this reason, it is also called as a ‘rich man’s disease’ or ‘upper-class disease’, though this moniker is not really justified as diabetes mellitus can affect all strata of society.
In the US, more than 30 million people suffer from the different versions of diabetes mellitus at any given time, which amounts to roughly 10% of the population. This includes a large number of undiagnosed cases, which is estimated to be around 8 million. About 1.4 million new diabetes cases are added each year.
The prevalence is higher among seniors. About 26% of all diagnosed and undiagnosed diabetes sufferers are aged 65 years or more.
Diabetes mellitus also accounts strongly as a leading cause of death. In the US, it is considered to be the 7th largest cause of fatalities.
What Causes Diabetes Mellitus?
All three forms of diabetes mellitus have a similar cause — a disturbance in the proper functioning of the hormone insulin.
Insulin is produced by specialized cells of the pancreas, known as the beta cells of the islets of Langerhans. The main function of insulin is the utilization of glucose. However, if there is any kind of discrepancy in the formation of insulin, then this glucose utilization does not occur. Due to this, the blood sugar level increases and leads to diabetes.
How Are the Types of Diabetes Differentiated?
The three types of diabetes mellitus are classified based on the cause of insulin malfunction or deficiency.
• Type 1 Diabetes — In this type, the body is incapable of producing enough insulin for the body’s needs.
• Type 2 Diabetes — In this type, the body has enough insulin but the body is resistant to it, due to which insulin cannot metabolize sugars.
• Gestational Diabetes — This is a special type of insulin deficiency that might occur in women during pregnancy due to hormonal imbalances.
Why Is Diabetes Mellitus so Dangerous?
All forms of diabetes, if left untreated, can lead to several kinds of complications, some of which might be fatal.
If left untreated, type 1 and 2 diabetes can cause cardiovascular diseases such as atherosclerosis, angina, and even heart attacks. They can lead to brain strokes as well.
Diabetic patients can also suffer from neuropathy, which is a kind of nerve damage. When this occurs, the patient loses the sense of feeling in particular areas of the body. This can also cause erectile dysfunction and impotency.
Another vital organ that is affected by prolonged diabetes is the kidney. This may increase to such a stage that it might necessitate dialysis or kidney transplant.
Other parts of the body that are affected by diabetes mellitus include the skin, eyes, and ears. Prolonged diabetes can cause accumulation of blood sugars in the foot, which is known as gangrene. This might necessitate amputation of the foot.
Gestational diabetes has its own long list of complications as well. It might be harmful to the baby as the high blood sugar passes on into the baby’s body via the placenta. It might also cause deformities in the baby and even cause death. After the pregnancy, the mother could suffer from low blood sugar.
How Do I Know I Have Diabetes?
Type 1 and Type 2 diabetes are characterized by the following symptoms:-
1. Frequent thirst and urination
2. Feeling hungry often, even shortly after having a meal
3. Unexplained loss of weight
4. Uncharacteristic tiredness and fatigue
5. Feelings of irritability
6. Lack of proper vision and blurring
7. Wounds that take a long time to heal
8. Infections of the body, especially skin infections.
You could confirm the presence of diabetes mellitus by using a urine testing kit that is available at most chemists’ shops.
What Are the Risk Factors of Diabetes Mellitus?
The chances of having diabetes mellitus increase drastically in the following cases:-
• If there is a family history of the disease
• If there is presence of antibodies in the cells that might impair the function of insulin
• If the diet is high in sugar-containing foods
• If there is excessive body weight or obesity
• If the person leads an inactive lifestyle
• If the person has high blood pressure (over 140/90)
• If the person has a high cholesterol level
• If the person is above 40 years (despite this point, it is necessary to mention that younger and younger people are being diagnosed with diabetes in recent times)
• If the person belongs to a particular race – Hispanics, African Americans, American Indians and Asians have a higher risk.
How Do I Prevent Diabetes?
If you already have a family history of diabetes, you might already be inclined to develop this disease or might already have it too. However, the following activities will help to prevent this condition and also to manage it if you already have it.
• Keep fit. Exercise daily. Walking for at least half an hour a day is a much.
• Keep a watch on your body mass index (BMI). Bring it down to healthy levels.
• Avoid hyperglycemic (high sugar containing) foods.
• Use hypoglycemic (low sugar containing) foods in your diet.
• Avoid smoking and alcohol.
• Regularly visit your medical professional and keep tabs on your blood sugar level.
Health pack for diabetes mellitus
1. Madhu nashini vati– Divya madhunashini vati is an herbal preparation from the house of baba ramdev that is known for its miraculous effects on diabetes. It may prove very effecting in bringing down the elevated blood sugar levels. It is an herbal combination that is enriched with certain rare ayurvedic herbs that are known to have a wonderful effect in sugar or diabetes problem. These days diabetes is a major problem in the world and almost every corner of this world has been touched by this unwanted disease. Ayurvedic experts suggests that, divya madhu nashini vati has certain herbs that have the capability that may be extremely beneficial in getting rid of this problem. Madhu nashini vati has been specially designed to cater the need of diabetic patients and reduces the pains and symptoms of it.
2. Panchkol churan – Divya panchkol churan is a combination of 5 important ayurvedic ingredients that are effective in increasing the metabolism in the body thus is effective in countering the problem of diabetes and its allied symptom. It is also beneficial in improving digestion.
3. Trivang Bhasam – Divya trivang bhasam is a wonderful herbo Mineral classical ayurvedic herbal supplement that not only helps in treating high glucose patient but is also effective in catering the side effects of diabetes. It is also helpful in increasing the energy levels in the body. It not only supports the blood circulation but is also helpful in nerve conduction and improves nervine disorders.
4. Chandraprabha Vati – Divya Chandra prabha vati is a classical ayurvedic preparation that is being manufactured by divya pharmacy. It is a wonderful herbal tonic that has a good amount of shilajit in it. Shilajit is extremely beneficial in diabetes patients. It not only helps in lowering the sugar levels in the body but is also helpful in providing the lost energy in the diabetic patients. Chandraprabha vati is a wonderful urinary tract problem. It is helpful in eliminating of excessive sugar so that body maintains the normal levels of sugar. More over it controls the frequency of urination that is a side effect of diabetes.
5. Shilajit Rasyanam – Divya Shilajit Rasyan is another wonderful herbal product that may prove effective in countering diabetes and its symptoms. It is not only helpful in reducing the sugar levels in the body but also helps in improving the blood circulation in the body thus helpful to the diabetic patients whose blood circulation gets hindered due to excessive sugar deposition.
6. Vasant Kusumakar ras – Divya Vasant Kususmakar ras is a classical herbal preparation that is effective in treating diabetes. This herbal formulation is a classical ayurvedic preparation that not only helps in reducing the sugar levels in the body but is also helpful in improving the blood circulation. It is also helpful in stimulating the pancreas that are involved in the production of insulin in the body, necessary for metabolism of glucose in the body.
There are no reviews yet.
Be the first to review “Diabetes Mellitus”
|
Teach Computing
Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.
What's New
CommandPoint CAD
CommandPoint by Northrop Grumman offers a range of CAD systems for various ...
CAD+911 System
TriTech Software Systems is a company that specialises in Computer Aided Di...
London Ambulance CAD failure
The 1992 London Ambulance Service CAD failure is probably the most notoriou...
Washington State 911 Failure
A 911 emergency telephone system in Washington State and Oregon shut down f...
London ambulance failure (2017)
A 2017 failure of a London ambulance dispatch system is believed to have le...
Computer Aided Dispatch outage
A 911 system failure left emergency calls unanswered and is said to have co...
Load balancing videos
This short article and the associated video explain 5 load balancing algori...
Intergraph Computer-Aided Dispatch (I/CAD
Intergraph Computer-Aided Dispatch (I/CAD) is a system offering many of the...
Boolean logic worksheet pack
These three Boolean logic worksheets have exam style questions on logic sta...
Resources discount offer
4.3.5 Sorting algorithms
Click here for recommended AQA A-Level Computer Science textbooks.
Sorting algorithms
VisuAlgo: Sorting Algorithms
Visu Algo is another site which offers animated visualizations of common computing algorithms. The great thing about their animated sorting algorithms is the ability to display pseudo-code next to the animation and have it run step-by-step, following each line of code as it is processed. Really useful for helping students better understand code.
Updated: 2015-04-13
Sorting algorithms
Sorting Algorithms
As its name suggests, Sorting Algorithms features animations of popular sorting algorithms, including Bubble, Selection, and Insertion. The animations for each sorting method are played side by side, allowing a direct comparison. The great thing about this site is that students can select the state of the starting data (reversed, random, almost sorted, etc) as well as its size - this is perfect for helping students compare the efficiency of the algorithms and understanding that there is no generic "best" algorithm for all circumstances.
Updated: 2015-04-13
Searching and sorting
Searching game
The Searching Boxes game from the CS Field Guide makes for a good lesson starter and can help students understand the need for different searching algorithms. Once they have tried part 1, students could try Searching Boxes Part 2 and try to devise a better search algorithm.
Updated: 2017-01-23
Merge sort and bubble sort
Bubble sort and Merge sort
Using a combination of playing cards and simple computer animations, this video clearly explains the bubble sort and merge sort algorithms step by step. It also compares the speed of each algorithm of data sets of different sizes.
The second half of the video examines the complexity of the algorithms, introducing 'Big O' notation and highlighting how bubble sort's complexity is a major drawback on large lists.
Updated: 2015-05-27
Bubble sort algorithm
Bubble Sort algorithm
This Bubble Sort video does exactly as its name suggests - explaining the algorithm clearing with the aid of diagrams. Although it is labelled as "Java", it is relevant to all computer science students.
There is also a good explanation of the algorithm (including why it is very inefficient) plus step by step diagrams here.
Updated: 2017-01-23
Merge sort algorithm
Merge sort algorithm
Harvard's CS50 Merge sort video uses a really clear approach - numbered plastic cups which are moved around as we step through the algorithm. The same approach is used in all of their sorting algorithm videos, making it easy to compare different sorting algorithms.
Joe James' Merge sort algorithm video is also very clear.
For Merge sort in particular, step by step diagrams can be very helpful in understanding the algorithm. TutorialsPoint has a good set of diagrams, plus pseudocode.
Updated: 2017-01-23 |
Critical Reading: a Case Study
Here’s how to read a text critically as an exercise in improving your English rather than for surface comprehension. Let’s take this article, the not-so-United Kingdom: Britain is sliding towards Scoxit , from the Economist as our sample text.
The first question is to figure out the purpose of the text. Besides being a news text, the author has taken a strong position that Scottish independence has become both more likely and less economically feasible as a consequence of Brexit.
Notice what is not in the article: should, in my opinion, to my mind, I think, therefore or I feel. Instead, would is used seven times; could and may are used three times apiece. This quote captures the essence of the style:
For a country of 5m people that depends on two sputtering industries, to go it alone would be a gamble. Yet Scots may conclude that remaining in the Brexit-bound union would be riskier still. They would be wrong. For although Mrs May’s willingness to leave the single market and customs union is likely to be bad for Britain, it also makes independence more complicated.
A typical non-native speaker of a Germanic language would tend to produce a text along the lines of:
In my opinion, Scotland shouldn’t leave the United Kingdom, because its economy will suffer.
While there aren’t an ‘mistakes’ in that sentence, it doesn’t carry the richness of natural English and sounds abrupt and halting. The harshness of a strongly worded opinion is softened when such an opinion is phrased as a conditional.
The rhythm of this quote is also used to add emphasis. The sharp contrast of the four-word staccato sentence sandwiched between a twenty-word and thirty-word sentence naturally draws attention to and emphasizes the author’s opinion that it would be a mistake for Scotland to leave the United Kingdom.
I’m constantly asked if a text has mistakes, which is the wrong question. The right question would be, would a native English speaker writing in this context have written the text this way? |
Posted in
Psychointegration 09/23/2008
By Jorge Olguin.
Jorge Olguín: We, the human beings, have several minds. The mind that makes us think, the one that makes us restrain impulses, that makes us reconsider, that is the analytical mind. The analytic mind is located in what we call the cerebral cortex, which is just below the skull cap. (1) That is our analytical mind.
In the middle of the brain, in the frontal part, we have a corpus called the amygdala (2) and that's where it’s located The reactive mind. The reactive mind is the mind that is driven by impulses.
I said that many years ago, our ancestors – I’m talking about thousands of years ago – they had no analytical mind, they were exclusively impulsive. They saw a smilodon (3) and they did not say, "Shall I beat him? Or Will it eat me up?" They automatically had tenths of a second to escape. Or they saw a small animal and they did not think, "Will I hunt it or not?" They simple grab a rock, a big stone and threw it at the small animal to hunt it. That reactive mind saved many of our ancestors' lives at that time because it was an absolutely instinctive mind.
As the human began evolving, he was having a conceptual thinking. He even drew pictures in the caves. The fact of drawing already made him analytical.
The analysis was not entirely beneficial for the human being, because while thinking that same analysis began to make him believe in gods and demons. He was afraid of the thunder and one day, suddenly, he killed an animal and it stopped raining. Then, he thought mistakenly: "Oh, to the god of the rain I sacrificed a small animal and the rain stopped, then that god feeds on sacrifices"
Wrong, wrong, wrong. Obviously that is a tremendous mistake. As our civilization advanced, the sacrificial ceremony was also advancing; that is, although the human being was rational, he was irrational in reference to gods and demons. The gods and demons deserved sacrifices. From ancient times - even in America before the year 1400 - the Mayans, the Aztecs, the Incas, who were apparently "more advanced" than other natives tribes of the continent lived with sacrifices. They saw a volcano, which was active and killed a young virgin or a young man and threw them to the mouth of the volcano; And well, it is not like in the movies that within five minutes the volcano was appeased. However, in one day or two, that volcano ceased to erupt, and they thought, "It was appeased due to the sacrifice we made."
That is, from ancient times, from thousands and thousands of years ago until today, year 2008, in some religions, they still rely on sacrifices to appease these “gods or demons”.
The reactive mind, over time, became useless, because that primitive man began to use a stick, then he transformed it into a spear, eventually he built bows, arrows, then large animals no longer had the chance to eat them up so easily. That reactive mind was already useless. However, since the reactive mind has been etched in the genes of the human beings for thousands of years and the analytic mind has ten to thirty thousand years, the reactive mind will always react first and not the Analytical mind.
There are cases, examples, an example I always tell, which is very painful, happened one day when I was at a bus stop and there was a father in his late thirties with his very small child, who was running back and forth around while waiting for the bus. The father told him to stay still and the boy did not stay still, the man took his boy by his wrist and he lifted him up to the height of his eyes and began kicking him in the legs. He released his hand, and the boy fell to the ground like a trash bag, they boy was already hurt and he began to cry. The father took three to four seconds to realize what he had done:- "What did I do!"- he lifted him up and covered him with hugs and kisses. Giving kisses was not going to calm the pain the boy was feeling.
Well, that's the reactive mind. The Father first reacted with his reactive mind. Then, the analytical mind made him come to reason:- "What am I doing?" But since the reactive mind is engraved in the brain from many thousands of years, it’s the one that is triggered first.
Does this mean we are doomed? No, this does not mean anything. This only means that the reactive mind takes priority in certain cases. If we live in a state of alert we are going to respond using the analytical mind. A young man wrote to me via e-mail saying:
- "But what you are saying is absolutely tremendous!"
- In which sense?
- Yes, in the sense that it is worse than being reactive, being in a permanent state of alert, if something happens, it is as if we had our own security system.
- No, it is not like that because one gets used to it.
It is true that the human being is an animal of habits - in some things - and one get used to be alert; after all, one lives a normal life, being alert becomes just like breathing. After one begins to be alert one becomes a gentle person, one becomes a thoughtful being, one stops being reactive. Perhaps you may not be able to prevent the adrenaline blow in the top of your stomach, when you watch an unfair attitude from someone else, but if you are alert, it will prevent you from reacting; You will have the awful feeling, that small tachycardia, but from there it will not pass, unless some serious event happens, where you will have to intervene because there is a risk for you or another person. However, we usually get used to being alert and so the reactive mind does not take action.
There are countless cases like the one I mentioned, for example: the girl who came to ask me because she had been after a boy for months. I oriented her so that she can somehow manage to conquer him and start dating him. One day they went to drink coffee or something, and the boy said to her something that she did not like and all of a sudden, she took the glass of her drink in her hand and threw the content on his face. When she was leaving the place, already in the street, she grabbed her head and said to herself- "Oh, God! What did I do? - She said something worse to herself. She came to me the next day and told me, "I screwed it up! What do I do? is it possible that I can come back with him again?"
I said to her: "I don’t know, I cannot give you any possibility that you can conquer him again." Sometimes an impulse given recklessly or a word said mistakenly may take some time to be erased or sometimes it will never be erased. One will have to make a good effort to regain what was conquered, to climb once again the hill that we had alredy started to climb. It is very, very difficult this topic. "
The reactive mind was first discovered in the 1950s. That mind was the first reactive mind discovered,it was the automatic reactive mind. This mind is activated when a person is crossing the street unaware or distracted, then, the horn of a car sounds and the person automatically backs away to the sidewalk and the car passes by. Let's say this automatic reactive mind saved his/her life.
At that time it was not called an automatic reactive mind, it was called just reactive mind. When I discovered the second reactive mind, which is the impulsive reactive mind, in 1997, I had to name the first mind, the automatic reactive mind.
The difference between the two minds (reactive and analytical) came from a debate we had ten years ago, when we debated whether the truth was analytic or reactive, and I said that the truth was reactive because the person who is reactive has neither the chance nor the time to concoct a lie, The word just get out from the mouth, you get the truth. He told me, "No, because the automatic reactive mind is like a refrigerator, like a freezer, it does not lie or tell the truth, it has no thought."
"Yes," I said to him, "that impulsive reactive mind somehow makes the person authentic and says what comes out at that moment.
As we did not agree, then I said,
-Well, obviously we are both right, what happens is that we are talking about two different reactive minds: the automatic one, which is the original, does not lie or tell the truth, because it is a REFLEX; And the impulsive reactive mind, which is the one that tells the truth because it comes from within. For instance, when you say: -"You suck. You're good for nothing; you do not ask for this raise, blah, blah. "When this person thinks again, says:- "Oh, I did not mean it!" It was not true-. Yes it was true; it was what you were thinking. If later on you wanted to correct your sentence, it is another issue.
This happened in 1997 or 1998. In 2003 I discovered another reactive mind. The reactive depressive mind.
The depressive reactive mind also tells the truth. It is the mind that reacts when a person is absolutely depressive, he/she is dating, a new relationship, but the person is hurt due to the previous separation and the depressed person tells to the momentary new partner: "I am feeling empty inside, I feel absolutely nothing, It's as if I had no feelings inside me… I do not ... I do not know, I'm feling empty right now. "
And then, the next day while answering the phone the person says:- "Oh, I did not mean what I said, I do have feelings for you!"
No, no. What you said at the first day, when you said that you were feling empty, is actually true! If later on, you tried to disguise your feelings or because you're in a good mood and you believe you feel something, it's something totally different. But the truth is no, because the reactive depressive mind tells the truth. The reactive depressive mind does not lie.
There are some exceptions. There are people who are reactive and increase the offense to the other person in order to hurt her. I mean, I'm not contradicting myself; The reactive impulsive mind tells the truth, but there are people who are absolutely taken over by it and to hurt the other person they exaggerate saying:- "You never made me happy". "Truly these seven years I spent with you were meaningless at all from the first day." "I don’t know why I paid attention to you."- That person is partially telling the truth, but he/she is adding also lies. So, is it a contradiction to my original theory? No, because I also said on different occasions that the reactive mind, sometimes is nurtured from the analytical mind. I never said that the analytical mind was good, I said that the analytic mind makes the person think - but a person can also think about a swindle, then, the analytical mind, at that moment, feeds the reactive mind and the reactive person offends the person even more in order to hurt him/her; It tells things that the person does not even think about. Then, in most cases, the reactive mind tells the truth. In this case, it also tells the truth, but it seasons it – just like when one seasons a meal - with some lies to hurt the person even more. But I still insist that the impulsive reactive mind tells the truth. Sometimes it can increase that truth to hurt the person and to torture him/her at that moment ...
Interlocutor_1: Let’s say the person says that out of anger, right?
Jorge Olguín: ... just in total anger, because the person is totally reactive.
Interlocutor_2: Could it be the other way around?
Jorge Olguín: How come the other way around?
Interlocutor_2: For example praising.
Jorge Olguín: No. The reactive mind never praises, but it is ironic. I am going to give you an example, which is important: -"Oh! Sure, the gentleman now is leaving the house, and I’am staying here! Very well, congratulations... You are a genius, the best person there is ... What else can I expect from you?- So, Is that person praising him?
Interlocutor_2: Yes, a kind of sarcasm...
Jorge Olguín: But she is offending him; she Is actually humiliating him.
Interlocutor_1: It's like a hypocritical compliment.
Jorge Olguín: It is a hypocritical compliment. Then, the reactive mind will never really praise, not even to take advantage. The one that praises to take advantage is the analytical mind. The analytical mind-as I said before-does not mean that it is a good mind. A person who concocts a lie or a scam always has a plan to get someone out of the way...
Interlocutor_1: And those who praise someone, idolizing him out of fear?
Jorge Olguín: No. That is directly done by the analytical mind, but it also does it to take advantage in some way.
Not always one takes advantage from someone by taking something from him. For instance, if you have a position over me being you a tyrant boss, and I somehow flatter you so that you treat me better, then I'm not getting something material from you, I'm getting a good deal. It is still cunning. That would not be a hostile act on my behalf; it would be hypocritical, but not hostile. Not always being hypocritical means to be hostile. I am simply praising you; I am telling you a lie to avoid negative incidents against me.
The Masters of Light always teach us that a lie is hostile, but it depends on the lie, how it is going to be concocted and how that lie will serve. With a person who is very ill, we are not going make a joke to that man at the hospital saying: "Ah, Manuel, so you are dying and you did not say anything!" No. That seems totally cruel to me. It's a bad joke from so many years ago.
Not in all cases, it is hypocrisy, but it is ethics, it is diplomacy... If there were no diplomacy, politicians from different nations would say: -"I will not shake hands with you! You have ruined my twenty-five year of career. Why do not you rot in hell? And blah, blah, blah."- No, no. Somehow it's like in our society we need ethics and diplomacy. The right thing, the ideal thing, is that we had this ethics by ourselves; That is, not by calculation:- "Well, I'm going to be a diplomat to see what I get in this job or what I get from this person." It is not a hostile act, I insist, while obtaining a good deal. It could be a hostile act if the person takes something away from that person, by flattery, diplomacy or whatever. If it is only for good treatment, so that our boss treats us well, it is not a hostile act. Hostile act is all that hurts other people. For instance, If you're my boss and I flatter you and somehow you're more elastic with me, I'm not committing a hostile act because I'm not hurting you...
Interlocutor_1: No, you're trying not to be hurt.
Jorge Olguín: Right, I'm trying that they don’t hurt me. So, it is not a hostile act. It is a survival act, somehow. And this is concocted by the analytical mind.
That is the difference between the analytic mind and the reactive mind. The analytic mind is one, but it has several roots or several branches, up or down; Let's say several branches.
The reactive mind tells the truth. The impulsive, the depressive. The impulsive reactive mind takes from the analytical mind; it may lie a little or harbor a dose of lie but it still tells the truth. The automatic reactive mind - which was already discovered before I started with this spiritual topic, neither lies nor tells the truth because it is a conditioned reflex, - let us call it conditioned reflex, so that it is understood - and there are several variations of minds, but this Is the most important thing in the spiritual being.
Another thing that helps the reactive mind, so that it receives nutriment, is the ego. The ego is another fruit of the reactive, but different. It can be more subtle. The ego is like it has a life of its own. The ego disguises itself, the ego camouflages itself, the ego hides, and the ego tries to survive.
There are people who have a gigantic ego and disguise it through service. In Siddhartha’s version of Hermann Hesse, the protagonist in the middle of the book begins to do service, but he does it in terms of competence because his ego urges him to be useful; But look forward to seeing who is giving more and is competing. This competition wears out, burns energy, destroys the spirit because it is a competition that does not reach any goal, it simply goes in free fall. Until truly Siddhartha, in the novel, ends up discovering that the true service is exempt of any kind of ego, it has no need to compete against nobody, it serves only by enjoyment, to help others and if it sees the others happy, He is happy; There, one is free from ego. But the ego is camouflaged, the ego disguises itself permanently. The ego is a burden so great that we have, but so great ... And there is more, the ego does not really exist as such, the ego is part of ourselves; We ourselves are the ego. It is not that the ego was independent of us, like Sybil's Freudian psychological personalities where one personality did not recognize what the other personality was doing. We remember perfectly what we do driven by our ego. For instance, if we have a certain appetite, the ego will say:- "Take that, what happens later does not matter, take that fruit, no matter what happens later on."- Once you are satisfied, another ego says:- "What have you done? And now how do you handle this? Does it seem right to you? Look at what you have done!" "Yes, you're right". And another role of ego comes, with the role of victim:- "I'm good for nothing, I'll never move forward, I let myself be driven by my impulses." There are different egos that handle the person.
There are very practical examples for this. For example, there are beings who have abandoned a relationship and try to quench their thirst for a partner with another relationship, which is not attractive and once they quench that thirst they continue with the same thirst or even more thirst than before, and they feel empty, neutral, depressed, because it was not what they expected, the ego simply blinded them, thinking that this new spring water would make them forget the previous water spring. That is the work of the ego. The ego, in some way annuls the senses of the analytic mind because the ego is not analytic, the ego is never analytical. But beware because just like the impulsive reactive mind in some cases, the ego also drinks from the analytical mind; Because the ego, in order to quench its thirst or its appetite concocts things. The ego convinces, the ego masquerades as a peacock that opens its tail to attract the female, the ego also disguises... Once the person committed the hostile act, the ego hides like the ostrich that hides its head. That is, the ego first is like the peacock and then it is like the ostrich that hides its head. "It wasn’t me!". But there is no excuse because the ego is part of us. Just as I said before we have to be "alert" so that the reactive mind does not invade us and makes us say hurtful words that we regret to have said later on, we also have to be alert with regard to the ego, so that we don’t end up manipulated by this tremendous burden, which is the against our evolution; Because when the ego manipulates us, we become clumsy, me make mistakes, contradictory acts, hostile acts, we are indifferent, we make a thousand negative things dominated by the ego.
The engrams can be deactivated. In other words, engrams can be eradicated from the person. There are engrams that are very hidden, but they can usually be eradicated.
The roles of the ego, no, never. The ego can never be destroyed because it is part of us. The ego can be integrated; it‘s integrated. That is why my technique is called Psychointegration and not Psychodestruction. It integrates the roles of the ego into a Central Self. The one who commands, the one who leads the baton and the one who leads the orchestra, this one; Is our Central Self. The roles of ego are no longer dispersed in the periphery, they are all contained. But a role of ego can always come out. We are not exempt. Not even the best of the Masters, or the wisest will have his ego integrated 24 hours a day throughout his entire physical life. It is impossible! We are always going to be disturbed by something, there is always going to be something that makes us feel bad.
And there are passive roles of ego. Suddenly someone hurts you and you will run away and cry in silence. You are always going to be hurt by a loved one more than an unknown person. An unknown person may try to offend you and you can ignore him, but a person who is close to you, near to your affection can hurt you because he has more power, somehow, even though I always say that the power of the Word is given by one, but well; We are talking about very close beings, who have more power and they can hurt you. Then, that passive ego can make you lock up in your room and cry in silence. Cry, that's fine; It’s a kind of relief, but this means that the ego, somehow, continues dominating.
On the other hand, we are sensitive beings. Sensitive means that we are half sentimental and half emotional. Feeling? Love is a feeling, love is not an emotion. Hate, anger, can be emotions. Love is a feeling. But as I have said several times, personal love - which can be the love of a lover, the love of parents, the love of children, the love of brothers and sisters - drinks from both sides: it drinks from feeling and drinks from emotion. When you drink from emotion, that love can wobble because emotion is not a feeling, emotion is part of the reactive mind; Then, personal love is jealous, it can be possessive, etc. It can also manipulate to take advantage unlike impersonal Love that only thinks of giving and as impersonal Love does not need, does not suffer. However, as all of us on the physical plane, we feel personal love; we suffer in some way, because more or less each one uf us needs. Even the highest Master needs. No one can be entirely alone; we all need from each other.
There is a spiritual theory that speaks about us being possessed by demons. Let's put aside the part of the spiritual demons - which I always say have no power over us because we have divine free will - but there are other types of demons that are the inner demons. The inner demons can be the engrams or can be the roles of ego. Those that make us twist, those that make us devalue ourselves, those that make us think more about things that are not really important to think, those for which we ourselves make that domino effect, but against us, every time growing and growing, and we boil in anger by something that happened, our own demons are those that dominate us and make us commit those hostile acts. So, we also have to be alert against that, against those roles of ego that manipulate us so much. They are internal demons.
Sometimes they ask me if we can be alert 24 hours a day. No, because we sleep (laughs). We are not awake 24 hours. But we can be alert. We get used to being alert.
Many things can hurt us in life, but those who have more power over us, as incarnated human beings, are our closest loved beings. The closer they are, the more power they have. When I speak about power I am not talking about a real power by which we obey as if we were robots that if they push a button and we already walk like zombies. No, no. Power in the sense that we are most vulnerable, the more we love or the more we care. According to the case we are more vulnerable. That happens to all of us. He who says he/she is not vulnerable is a rock, and I think we are not interested in rocks; We are interested in living, feeling, enjoying, complementing ourselves, feeling that we are contained and contain others because everything has to be a feedback .
Religions teach - as Master Jesus said - "ask and it will be given to you", other religions or esoteric schools say: "No, you do not have to ask, you have to give". I say, "We do not have to be so strict, we have to do both." That is, the famous exchange of love, but not by speculation, because if there is speculation it is like everything was clouded, the water is already cloudy. Speculation is like the drop of ink in a liter of water; A single drop of ink clouds a liter of water. Then speculation clouds service, clouds that exchange of love. Then you have to do it really, because you feel it. If not, don’t do it - at least one is not hypocritical - until you are ready, until it is your time to do it. In the meantime, refrain.
I can not give a scale of values because I am nobody to set a scale of values, but well, in case I could have a scale of values, I first value the one who gives service for enjoyment, then the one that says: No, I'm not prepared to give service and I'm not going to give it. I do not want it, period. “Perfect; At least that person is not a hypocrite”
And finally the person who does the service to look good. I put it behind the one who crosses arms, because the one who crosses arms is frontal and for me he/she is reliable. Even without doing service is reliable. Instead, the person who serves with a smile drawn by lies, for me is not reliable. That person is like servile. I always say that the big difference between helpful and servile is that a helpful person is the one who tries to give to others. Servile, is the famous office mouse that, in order to get along with his boss, says:- "I've prepared a hundred memorandums more." The boss despises this guy because that kind of people, the servile, can betray even to his own mother. The servile is a hypocrite to the utmost exponent, but he is not a reliable person at all. Not at all. Zero reliability. I prefer the person who says, "No, I'm not ready to be helpful." I do not flatter her, I do not applaud her ...
Interlocutor_1: It’s like a person who disguises as a lamb and then as a wolf.
Jorge Olguín: Yes. To conclude, that's why I say that the person who straight forward goes and says: "I don’t do it" but looks at your eyes, I will not applaud, but that person is reliable. He is above the hypocrite on my humble scale of values.
(1) Cerebral cortex : Is the mantle of nervous tissue that covers the surface of the cerebral hemispheres, reaching its maximum development in primates. To continue reading you can click on the following link.
(2) Cerebral Amygala: set of nuclei of neurons located in the depths of the temporal lobes of complex vertebrates, including humans. To continue reading you can click on the following link.
(3) Smilodon: Smilodon ("tooth knife" in ancient Greek) is an extinct genus of feline saber teeth of the subfamily of the machairodont. To continue reading you can click on the following link.
This entry was posted on Saturday, April 28, 2018 and is filed under .
Blogger Templates |
To whom did Edward the Confessor leave his crown?
As Edward the Confessor lay dying, even as his great building project of Westminster Abbey came near its completion there was the question of who should inherit the kingdom. There were four possible contenders:
Edgar_the_ÆthelingFirst: Edgar the Atheling son of Edward the Exile, who was the son of Edmund Ironside – Edward the Confessor’s older half brother by their father’s first wife Aefgifu. But Edgar, who was only fourteen, was too young to rule independently and there were troubled times ahead. One source noted that Edward is said to have murmured something about being too young on his deathbed. Despite this, initially, his claim would be supported by Earls Edwin of Mercia and Morcar of Northumbria but the Witan preferred an adult to be in charge with William Duke of Normandy across the Channel preparing an invasion fleet. In the aftermath of the Battle of Hastings edgar would be elected king by the Witan. His nominal rule lasted two months until he was captured by William at Berkhamstead. He was never crowned and lived in William the Conqueror’s court as a “guest” until he fled to Scotland in 1068 where his sister, Margaret, was married to Malcolm III of Scotland.
Saint_Margaret_of_Scotland.pngThat was fine until 1072 when King William of England and Malcom of Scotland signed the Treaty of Abernathy and Edgar was forced to seek protection from King Philip I in France. He eventually returned to England where he received a pension of £1 a day. In 1097 Edgar led an invasion into Scotland and later still he went on a crusade to the Holy Land. He died in 1125. His sister Margaret, pictured right, is a saint.
Second: Harold Hardrada was a relation of King Cnut. Cnut’s son Hardicnut or Harthacnut, who had no immediate heir, had promised the throne to King Magnus of Norway – Hardrada was Magnus’s son. Hardrada claimed that the pact had devolved to him and now he wanted to claim the kingdom. When Harthacnut died in 1042 Edward was already in England and Magnus was not in a position to make his claim. Harold Hardrada had a reputation for being successfully violent and a large army to go with it so felt that he would be able to succeed in his bid for the crown.
Hardrada also had the support of Harold Godwinson’s brother Tostig. Tostig was the third son of Earl Godwin and had acquired the Earldom of Northumbria but had been forced to hand it back to Morcar (let’s not go there- this post is already quite long enough). Tostig’s role in the north of England had been similar to Harold’s in the south before the death of King Edward but he had not been very popular with the locals. His status can be seen by the fact that he was married to Judith of Flanders. Her mother was Eleanor of Normandy – making Emma of Normandy, Edward the Confessor’s mother, her aunt, demonstrating that once again everybody in History is related one way or another (read Geoffrey Tobin’s very informative comments at the end of the post about Edward the Confessor to find out exactly how intertwined the families of England, Normandy, Brittany and Pontieu were). Tostig, resentful of his demotion from the earldom of Northumbria and irritated by Harold’s promotion decided that he would like to be king so started to create trouble. To cut a long story short the fyrd or militia was called out. Tostig went to Denmark and from there to Norway where he met with Harold Hardrada and came to an agreement.
As it happened the wind favoured Hardrada’s invasion. By the 20th September 1066 Hardrada was in York. By the 25th September King Harold had made a lightening march north and confronted Hardrada’s forces at the Battle of Fulford. Hardrada who had been so confident of success that he’d brought the contents of his treasury with him was killed in a battle which his forces lost. King Harold noted that luck must have deserted the Norwegian.
William-I-of-EnglandThird: William, Duke of Normandy. He claimed that not only had Edward designated him to be the next king but that Harold had sworn under oath that he would support William in his claim to the throne. There was also the relationship that existed between Normandy and England. Emma of Normandy was the great aunt of William and Edward had spent most of his early life in exile in the Norman court. When William invaded he carried a Papal flag at the head of his army. The invasion was a crusade – God was on William’s side. He and his wife Matilda had even dedicated one of their daughters to the Church to ensure success.
king haroldFourth: Harold Godwinson – It seems that Edward, to answer the question posed at the start of the post, gave the care of the English into Harold’s hands as he lay dying. Certainly this is what the Bayeux Tapestry suggests (He seems to have forgotten the pact of 1051 that Norman Chroniclers reference as the starting point to William’s claim).
Harold was not part of the Royal House of Wessex although there were suggestions that his mother Gytha had been a bit closer to King Cnut than was entirely proper. Harold’s older siblings all had Danish names and big brother Swein (who died in 1052) claimed that he was Cnut’s son. Gytha had not been overly amused and had produced witnesses to testify that Earl Godwin was Swein’s father.
Just to side track a little bit, Swein was a busy boy with regard to Welsh politics. He also abducted the Abbess of Leominster – a lady called Aedgifu- with the intent of acquiring land. He was made to return the abbess and then he fled to Flanders. He travelled from there to Denmark where he blotted his copybooks and was required to leave in a bit of a hurry so he returned home in 1049. He managed to persuade his brother Harold and his cousin Beorn that he was a changed man. They agreed to take him to King Edward to plead his case. Unfortunately he then murdered Beorn and had to flee again. He was outlawed again but allowed back home in 1050. The following year the entire Godwinson family managed to irritate King Edward and Swein was given his marching orders with the rest of his clan.
Swein ultimately repented of his sins and went on a pilgrimage to Jerusalem. When he returned someone killed him but he left one son, a lad called Hakon, who managed to find himself in the Duke of Normandy’s custody along with another brother of Harold’s called Wulfnoth. It is thought that Harold was going on a mission either to negotiate their release in 1064 when his boat was blown off course, landed in Ponthieu and was captured by Count Guy of Ponthieu. William, Duke of Normandy demanded that Guy, who was his vassal, send Harold to him in Rouen immediately.
However, back to where I was supposed to be. Harold was the senior earl in the country – no matter what Edwin and Morcar might think- he owned large tracts of land and vast wealth. His sister was Queen Edith, King Edward’s wife. Unusually Edith had been crowned when she became queen – the Saxons don’t seemed to have bothered with that sort of thing much. After King Edward’s dispute with the Godwinsons had been forgiven in 1052 Harold and his brother Tostig had more or less been responsible for running the country. Ultimately the Witan decided that Harold was the man for the job so appointed him as their monarch after Edward the Confessor. He ruled for nine months and nine days until he was defeated and killed in his turn at the Battle of Hastings on the 14th October 1066.
Edward the Confessor
Edward the confessor drawn.jpgKing Edward was born sometime between 1003 and 1005 at Islip in Oxfordshire. His father was the unfortunate Ethelred the Unready. It should be “Unraed” which means ill counselled or sometimes he’s described as “the Redelss” which means more or less the same thing. If Edward has a reputation for saintliness then his poor old father has a reputation for being the most incompetent king in English history – which is saying something. He had the misfortunate to be king at the time when the Scandinavians were flexing their muscles again and after a long period of peace the English were not in any state to resist. The Anglo Saxon Chronicles of the period talk a lot about flight and being beaten.
The policy of buying off hairy Viking brutes with large axes is called paying Danegeld. The Saxons had used the method before but after the Battle of Maldon in 991 it became much more commonplace. And, of course, in paying off one bunch of raiders it didn’t mean that another independent group would arrive or that the first lot wouldn’t turn up for another bite of the cherry. It went from bad to worse when a Dane called Sweyn Forkbeard arrived with the intention of invading rather than looting.
Ethelred was understandably feeling somewhat harried but it was perhaps a little bit excessive to order the death of all the Danes living ins kingdom especially as the Wantage Code of 991 had been agreed so that the Danes who lived in England would feel greater loyalty to the Saxon rulers. On 13 November 1002 there was an attack on all the Danish settlers in the kingdom. This is known as the St Brice’s Day Massacre and had the obvious effect of making all the surviving Danes rally towards Sweyn as averse to the monarch of their adopted country. Sweyn took the opportunity to destroy Exeter – a stronghold of the Saxons.
More sensibly in 1002 Ethelred had arrived at an agreement with the Normans to prevent the Danes from using the Normandy coast as a harbour and jumping off point for their endeavours. As you might expect this agreement was cemented by a royal marriage. Emma of Normandy was sent to become Ethelred’s wife.
In 1011 the Danes captured Canterbury and its archbishop. They carted the unfortunate archbishop to Greenwich where they had their encampment. Archbishop Aelfheah refused to allow himself to be ransomed so the Danes killed him by throwing discarded ox and cattle bones at him. Eventually someone put him out of his misery by hitting him over the head with the butt of an axe.
Emma of Normandy.jpgIn 1013, the area known as Danelaw decided that Swyn and his son Cnut would make excellent rulers. This freed up the way for the Danes to invade Wessex at which point Aethelred fled to the Isle of Wight in the first instance leaving Emma to take her two small sons Edward and his younger brother Alfred home to Normandy (shown pictured left) – a young Edward is seated behind his mother.
Sweyn Forkbeard died in 1014 leaving Cnut to rule. Ethelred returned at this point in proceedings to try and retrieve the situation but he also died in 1016. Emma remained in England despite the fact that her children were in her brother’s kingdom. Emma now married Cnut – ignoring the fact that Cnut had a wife called Aelfgifu who he had married on 1006. So, Emma became queen for a second time. She had a son called Harthacnut and set about forging a more united kingdom for the Saxons and the Danes.
All this time Edward was in Normandy where his cousin Robert was now the duke. It was Robert who demanded that Edward should be allowed to return home and that with Ethelred dead that Edward was the rightful king – although this did bypass the fact that Edward and Alfred were the product of a second marriage and that other older sons were available. It was only when Robert died andWilliam became Duke of Normandy that the political situation changed. The Normans did not now have the leisure to interfere in English affairs and it looked as though Edward and Arthur would be left kicking their heals.
In 1035 Cnut died. Emma had negotiated as part of her marriage alliance with Cnut that any sons she might have would have a better claim to the kingdom than sons by other women. She took the precaution of commandeering the treasury. Unfortunately Harthacnut was in Denmark when Cnut popped his clogs so whilst Emma waited in Winchester for the arrival of her son, Cnut’s other wife Aelfgifu lobbied for her own son Harold Harefoot to become king. Ultimately there was a meeting in Oxford as both sons had a claim to the throne and both of them had their own group of supporters. Harthacnut still had not returned to England – so inevitably Harold Harefoot had the upper hand simply because he was on the scene.
It was a period of uncertainty. This was the time that the sons by her first marriage to Ethelred, Edward and Alfred, returned to England to see if they could snaffle a kingdom whilst Cnut’s sons were busy. Edward made landfall in Southampton and then went to Winchester where he met with his mother. Alfred arrived in Kent.
Unfortunately Earl Godwin had his own vested interests to consider and they did not involve the sons of Ethelred the Unready. He met with Alfred and said that he would escort Alfred to Winchester. Instead he captured Alfred and blinded him. Edward seeing which way the tide had turned fled back to Normandy.
In 1037 Emma was forced to leave England. Harold Harefoot was king. Ultimately Harthacnut did not have to worry about invading England because after three years as ruler Harold Harefoot died rather unexpectedly whilst celebrating a wedding.
Harthacnut would not have won a popularity contest. He died unexpectedly as well.
Earl Godwin now decided that Edward was a better bet than some of the other possible claimants to the Crown. Edward was crowned on 3rd April 1043 in Winchester. The price for Godwin’s support was marriage to his daughter Edith – who had originally been named after her mother but changed to the more Saxon sounding Edith upon marriage – something that occurred in 1045 when Earl Godwin was at the height of his powers. Edith was about twenty-two whilst Edward was somewhere close to forty as we aren’t totally sure which year he was born. Rather unusually Edith had her own coronation. Anglo-Saxon kings don’t seem to have crowned their spouses very much.
Godwin had done very nicely from the rule of Cnut. He also had a Danish wife called Gytha who just so happened to be Cnut’s sister through marriage and a brood of sons – something which Edward the Confessor lacked. His sons Swein and Harold both became earls in their own right and they were brothers-in-law of the king just as Godwin was the king’s father-in-law. The trouble was that Edward did not look towards Scandinavian countries for alliances. He turned to Normandy. Matters came to a head in 1051 when Edward insisted on appointing a Frenchman to the archbishopric of Canterbury. There was then a spot of trouble in Dover which Godwin refused to put down followed by a stand off at Gloucester when Godwin had a rant about foreigners.
Edward who was not always the saintly but weak man that history often portrays him called out the militia which meant that Godwin and his sons found themselves on the wrong end of an army – including some of their own tenants. Edward then outlawed Swein who had some very questionable attitudes to women and property. He demanded that Harold and Godwin explain themselves or face the consequences. Godwin fled and was declared an outlaw – I’m not sure if any of this enhanced Edward’s relationship with his wife- especially when he confiscated Godwin’s property and sent Edith to a nunnery where she remained until 1052.
There is some evidence that by 1051 Edward had agreed to William becoming the next king of England but it is also true to say that Edward contacted the exiled son of Edmund Ironside, who was Edward the Confessor’s older half-brother by Ethelred’s first wife, and invited him to return from Hungary. His name was also Edward. History tends to call him Edward the Atheling or more pointedly Edward the Exile. Edward the Atheling received his letter from his uncle inviting him home in 1056 having sent someone to find him on 1054. He arrived with his wife Agatha, his daughter Margaret and his son Edgar. This exiled family was a way for Edward the Confessor to get one over on Earl Godwin because not only did the king want to support his own family but the Witan (England’s council) liked the idea of England being ruled by the Saxon ruling house rather than a power hungry Godwin who’d done very nicely thank you out of Cnut’s reign. Unfortunately Edward the Atheling died unexpectedly on 19th April 1057 without ever meeting Edward the Confessor. The inevitable suspicion is that some unscrupulous person must have poisoned the Atheling leaving Edgar who was too young to be of political signficance.
Which brings us back to Earl Godwin and his brood. Godwin had returned from exile in 1052 along with his son Harold who’d spent the time in Ireland. Together they were able to march on London and force Edward to reinstate them. Godwin died the following year but Harold was now nicely positioned to make a claim on the crown assuming that athelings dropped like flies whenever they came near his brother-in-law King Edward.
Meanwhile Edith was allowed to return to court when her father and brother regained the upper hand as Edward lacked the men or will to overcome them a second time. Clearly the time spent contemplating her situation hadn’t improved the relationship between husband and wife. Historians speculate as to the nature of their marriage. It has been suggested that Edward refused to consummate the union because the bride was forced upon him by the family who had betrayed his brother, blinded him and left him to die.
From 1055 onwards the Godwinsons – Harold in the south (he had inherited his father’s Sussex estates) and Tostig in the North were more or less responsible for the running of the kingdom. Edith can be found issuing charters and patronising monastic houses – in particular Wilton where she was educated and spent her time in exile from court.
In 1064 Harold made a mysterious trip to Normandy. It might have been a bid to ransom members of his family or it might have been a bid to sort out who would wear England’s crown after Edward died. Either way, Harold ended up taking part in a campaign against Conan II of Brittany and apparently swearing to support Duke William to become Edward the Confessor’s successor.
When Edward the Confessor died on 5 January 1065 he had just finished work on Westminster Abbey which is featured in the Bayeux Tapestry – a workman is in the middle of affixing a weather vane to it to indicate how complete it was. These days he has a reputation for holiness thanks in part to William of Malmesbury who wrote, in the 1120s, about Edward and miracles associated with him either in his life time or at his tomb. It was from texts like this that the concept of the king being able to cure scrofula or “the king’s evil” is derived.
Inevitably Edward the Confessor is usually remembered as the king who died and triggered the Norman Conquest.
Morris, Marc. (2013) The Norman Conquest. London:Windmill Books |
Do you know that your stomach nervous system contains more neurons than your whole spinal marrow and that information is continuously exchanged from your stomach ‘second brain’ to your superior functions of your ‘main’ brain?
Do you know that your heart actually sends more signals to your brain than your brain sends to your heart and those heart signals have a significant effect on emotional management and higher cognitive faculties such as attention, perception, memory, and problem-solving?
Latest medical and neurosciences studies provide new scientific evidence of how our body, mind and feelings work together.
Nothing new, you may say: for centuries, we’ve been commonly saying: ‘Listen to your heart’ to take an important decision ; or ‘It takes guts’ to refer to courage and willpower…
Yes, our body holds wisdom and intelligence since ages… but in Western world, our cartesian mind may had forgotten a bit about it 😊
Sophrology practices aim at restoring or reinforcing the state of balance and harmony between what we feel, what we think and what we do in our everyday life. Here are some examples of how, in my practice, I rely on body wisdom :
Balancing :
Your body has intuitive capacities to restore balance.
Mental or emotional stress means a form of tension in your body. Being aware of those tensions and stress signals in your body is the first step. Having tools to release them is the second to increase your stress management capacities.
Enhancing :
Breathing techniques help you shift out of stressful emotional state. Meditation and coherence cardiac techniques as well.
Positive emotions do not only feel so good, they actually help your body’s systems synchronize and work better. You can develop your capacity to self-activate and eventually sustain a positive emotion.
The more you experience a calm, balanced, yet energized and responsive state; the more your body will allow you to perform tasks requiring mental acuity, focus, problem-solving, and decision-making, as well as physical activity and coordination.
Speaking and telling the truth :
Your body language does not lie. It is almost impossible to censor emotions. A large part of your body language is indeed unconscious and not controllable.
So, listening to your body and developing your body awareness are self-development gateways.
To communicate effectively with others, relying on your ability to sense with your whole body what other people are feeling is also an important factor in allowing you to connect. When you are engaged in deep conversation with somebody, your body also participates, synchronizing movements and postures, vocal pitch, speaking rates and length of pauses, and even important aspects of your physiology.
Last but not least, to access more of your intuitive intelligence and inner sense of knowing, one of the most important keys is developing deeper levels of self-awareness of your more subtle feelings and perceptions, which otherwise never rise to conscious awareness.
In sophrology practice, I can use mental imagery in a deep relaxation state to connect with your intuitive intelligence.
And I am always impressed by the powerful impact of this simple practice to visualize the long-searched solution, to let emerge the desired vision or see the situation differently!
Your body holds wisdom, simply listen and trust it !
Nadège Ravoux – HealthyLux Passionate Contributor
HealthyLux July theme – Your body holds wisdom
If you would like to volunteer for a Healthy Luxembourg, please contact us ( We can’t wait to hearing from you!
Antonio Damasio (professeur de neurosciences, neurologie, psychologie, philosophie, Brain and Creativity Institute, University of California) - L’ordre étrange des choses.
Exploring the Role of the Heart in Human Performance. An Overview of Research Conducted by the HeartMath Institute.
Harvard Medical School Study of 1,623 heart attack survivors found that when subjects became angry during emotional conflicts, their risk of subsequent heart attacks was more than double that of those who remained calm.[65] Mittleman, M.A., et al., Triggering of acute myocardial infarction onset by episodes of anger. Determinants of Myocardial Infarction Onset Study Investigators. Circulation, 1995. 92(7): p. 1720-5.
Positive emotions are a reliable predictor of better health, even for those without food or shelter while negative emotions are a reliable predictor of worse health even when basic needs like food, shelter and safety are metPressman, S.D., M.W. Gallagher, and S.J. Lopez, Is the emotion-health connection a "first-world problem"? Psychol Sci, 2013. 24(4): p. 544-9.
Leave a Reply
More HealthyLux articles |
20 February 2017 The study of LED light source illumination conditions for ideal algae cultivation
Author Affiliations +
Utilizing LED light source modules with 3 different RGB colors, the illumination effect of different wavelengths had been investigated on the growth curve of the same kind of micro algae. It was found that the best micro algae culturing status came out with long wavelength light such as red light (650~670 nm). Based on the same condition for a period of 3 weeks , the grown micro algae population density ratio represented by Optical Density (O.D.) ratio is 1:0.4:0.7 corresponding to growth with Red, Green, Blue light sources, respectively. Mixing 3 types and 2 types of LEDs with different parameters, the grown micro algae population densities were compared in terms of O.D. Interestingly enough, different light sources resulted in significant discoloration on micro algae growth, appearing yellow, brown, green, etc. Our experiments results showed such discoloration effect is reversible. Based on the same lighting condition, micro algae growth can be also affected by incubator size, nutrition supply, and temperature variation. In recent years, micro algae related technologies have been international wise a hot topic of energy and environmental protection for research and development institutes, and big energy companies among those developed countries. There will be an economically prosperous future. From this study of LED lighting to ideal algae cultivation, it was found that such built system would be capable of optimizing artificial cultivation system, leading to economic benefits for its continuous development. Since global warming causing weather change, accompanying with reducing energy sources and agriculture growth shortage are all threatening human being survival.
Chun-Chin Tsai, Chun-Chin Tsai, Chien-Fu Huang, Chien-Fu Huang, Cin-Fu Chen, Cin-Fu Chen, Cheng-Feng Yue, Cheng-Feng Yue, } "The study of LED light source illumination conditions for ideal algae cultivation", Proc. SPIE 10107, Smart Photonic and Optoelectronic Integrated Circuits XIX, 1010714 (20 February 2017); doi: 10.1117/12.2255625; https://doi.org/10.1117/12.2255625
Back to Top |
Stay informed: Sign up for eNews Subscribe
Playing It Straight Art and Humor in the Gilded Age
Read Chapter 1
Chapter 1
Winslow Homer's Visual Deadpan
His words were often open to an ironical interpretation, and one could not always make sure whether he was speaking seriously or, as the pithy slang phrase has it, "through his hat."
William Howe Downes, The Life and Works of Winslow Homer, 1911
Winslow Homer's "sense of the dramatic," his feeling for grave and often tragic situations, has made him a titanic figure in the history of American painting. His work, which, from the 1890s on, revolves around the themes of man versus nature and life versus death, has inspired some of the most nuanced argumentation on nineteenth-century American painting. In Inventing the Modern Artist: Art and Culture in the Gilded Age (1996), for example, Sarah Burns investigates how Homer's paintings of men at sea spoke to American businessmen riding the perilous wave of an unpredictable stock market and purchasing Homer's paintings as heroic testaments to their own manly struggles. Elizabeth Johns, in her biography Winslow Homer: The Nature of Observation (2002), accounts for the grave scenarios of Homer's imagery by turning the focus from the patrons to the artist himself. She sees Homer's artistic production as a form of spiritual self-reflection. He was an "observer" in a period when "observation meant using God's gifts of mind in the most reverent way," that is, "to study and draw conclusions about a world in ongoing creation."
This chapter moves in another direction. Taking a cue from two of Homer's earlier biographers, William Howe Downes and Philip C. Beam, I reconsider the central importance of the "gag" to Homer's dramatic sensibility. If Homer was engaged in a spiritual quest, if his art spoke to embattled Gilded Age manhood, how did he arrive at a painterly idiom that encapsulated such heady concerns? He cultivated a reputation for seriousness only after attempting to bring the gags of his illustrated work to oil painting, a medium he first explored in the early 1860s, during the American Civil War. To stress this should not diminish his stature but rather add nuance to our understanding of his complex art. For Homer during these years created an entrée to the New York art world by way of visual deadpan, which resonated with the methods of the period's controversial platform comedians and answered the critics' call for a "higher sort of humor," different from the antebellum comic mode that one critic derisively dubbed the "funny school of the fifties."
If much of that pre-Civil War work can be described as "semantic prattle," an art that signposts and almost compulsively restates to convey its meaning, Homer's paintings offer no easy punch lines. In Homer the joke is "told gravely," to borrow a phrase Mark Twain uses in explaining the mechanics of verbal deadpan. Indeed, Homer's paintings withhold the conspiratorial wink and nudge, framing jokes in understated, even ambiguous terms.
The ironic and subversive qualities of Homer's works are most perceptible in the 1860s, during the war, which many commentators considered a "ludicrous" and "grotesque" spectacle. Nathaniel Hawthorne asked in 1863 whether the war, as a play "too long drawn out," could be classed as "tragedy or comedy." People at the time paired the "comical and the coffinly" or spoke of levity and gravity, oppositions that apply to the structural dynamics of Homer's camp scenes (Plate 1). Often these works incorporate an almost imperceptible light note at odds with the dominant heavy tone of the images. Scholars generally argue that these works picture mundane and unremarkable moments in a soldier's experience-the dark truth behind the idealist vision of battlefield valor. But how does levity fit into the construction of this mundane view? Homer explores the uneasy relationship between levity and gravity to meditate on the experience of war and the principles both of humor and of painting itself. If the hilarity of jokes is fleeting and humor difficult, if not impossible, to translate once its context vanishes-William Dean Howells, for example, criticized the humor of the antebellum period as "terrible stuff"-Homer admits that painting is powerless to record |
Howdy, Stranger!
Learn How To Improve Your Garden's Growth
How can you grow a fantastic garden that's the envy of all the other people? Because they are a fantastic gardener, of course. Should your horticulture skills can use a little improvement, and even if you're an incredible gardener who's always trying to find new ideas, tricks and tips to improve your horticulture skills, here are a few smart methods for you.
Should you be planting vegetables, choose varieties that don't require processing in order to keep. For instance, sweet potatoes and onions could keep for months if they are kept cool and dry, with no additional work by you. This reduces the amount of time you need to spend after harvesting.
Use seedlings to operate relay planting. Using seedlings can permit you to obtain a quick start on the growing season and improve yields for the harvest by extending time. If growing lettuce and a squash harvest is necessary for summer, then once the lettuce has been harvested it is possible to plant seedlings to have a jump start on another crop and a higher yield to the garden.
Reduce costs by drying the seeds through your annuals to plant the coming year. Petunias, zinnias and impatiens are just some of the flowers from where you can easily extract and save seeds. You will have to extract the seed pod from some flowers, and wait for it to split open. With others, like marigolds, you should open the flower and extract the seeds yourself. After extracting the seeds, let them dry for about every week. Place them inside a jar by using a rubber seal, and add silica gel pouches to ensure they are from absorbing moisture. Store them in the cool, dry location until you're able to plant them the new year.
Not just is horticulture the best way to grow your own food, but you can also improve your own drink. You are able to grow apple mint to create a delicious tea or rhubarb stalk to make a tart option to lemonade. You need to can or freeze your berries and fruits to make them into soda, hard cider, or wines.
A great way to keep insects and pests away with your garden would be to spray your plants using a dish soapy water mixture. A blend of one quart water then one half teaspoon dish detergent will kill off those pesky parasites. Be sure to respray every fourteen days.
Repel leaf-eating insects with chili pepper. Should your plants' foliage is now being ravaged by hungry insects, add one tablespoon of red chili pepper or hot mustard to one quart water inside a spray bottle. Spray the foliage evenly, ensuring that to find the undersides from the leaves too. One taste of this spicy spray sends bugs on his or her way.
Plan your backyard, and plant with fall colors in your mind. Fall, though, can nevertheless be an interesting time for trees. Fall is easily the most colorful time of the year for foliage. Maple, beech trees or dogwood carry out some amazing colors. Shrubs including cotoneaster, hydrangea, and barberry will even provide a a little color in the fall.
In areas which are very dry, you must plant drought resistant plants. These hardy plants will survive, and thrive, on minimal water, as well as in hot conditions. Many varieties have blooms as beautiful just like any high maintenance kinds of plants. You can even get low-water edible plants to your garden.
As stated before, many individuals have gardens in their homes. Some gardens are floral based and a few are food based. You can easily grow the garden in your own home using the tips from this article. Soon you'll be capable of smell fresh flowers and eat fresh vegatables and fruits.
• I have to voice my passion for your kindness for women who absolutely need help with the content. Your special commitment to passing the solution up and down turned out to be rather interesting and has continuously enabled individuals much like me to realize their dreams. Your entire informative key points denotes a great deal to me and substantially more to my office workers.
Sign In or Register to comment. |
Science discovery How To Write A Apa Paper
IBM researchers have made a different structure of synthetic intelligence based upon strategies accustomed to translate textual content from one language to another. Then again, the plan goodies atoms of chemical substances like letters and substances as separate phrases, and also the result of its work is simply not the interpretation nevertheless the dedication of the final outcome within the most intricate natural compound side effects, which within its Queue is generally used to increase the development of latest medicine, such as.Over the past 50 ages, scientists have had trouble to train reviews
the pcs vseet duties the „function” of substance transformations to create responsible forecasts within the successes of natural and organic chemical side effects. But nevertheless, natural and organic substances are often so sophisticated that their compound attributes and behaviour in the course of responses necessitate unacceptably substantial computational assets, usually the effects are smaller Believability to ensure they’re able to be trustworthy a hundred p.c.
How To Write A Summary Paper
Therefore the researchers around the IBM Homework corporation in Zurich made a decision for making an exceptionally abnormal go. Applying a synthetic learning ability-based interpreter method, they adapted it to operate in organic chemistry. As in most other scenarios, the new system is predicated on a synthetic neural network, which has been through a process of provisional exercise on countless known chemical substance reactions, many of which happen to be exceedingly sophisticated and therefore are completed in 30-40 Sequential steps. Quite simply, IBM scientists have trained their interpretation software the basic composition on the „language” of natural biochemistry.The plan is currently rendering successes that will be at least eighty for every cent solid. Still, in case the artificial learning ability finds that a substance reaction could go in several techniques, each and every of which can yield a different result, it is going to predicament the probable options that streamlining them in keeping with the computed probability.
How To Write A Simple Essay
Inside the around future, the researchers in IBM Analysis schedule in order to make their strategy available to everybody through the cloud provider. By then, the application is anticipated to guarantee which the gains aren’t any below 90 for every cent. Additionally, several added issues, for instance present temperature, pH-aspect, chemicals applied, etcetera., will now be taken into account inside of the new version from the plan, a lot of the affect of such aspects around the results on the substance response Synthetic knowledge must be entirely looked into independently in the midst of self-study.This speed and performance on the self-review operation was the result of a prolonged collection of the show results and configurations belonging to the artificial neural network, which lies for the heart with the synthetic intelligence procedure. Several other possible choices are allocated towards application itself and yes it performs this project by using the purchases vessel optimisation procedure. The one „unnatural” second with the self-study system is „sound” around the kind of random data set, and that’s what encourages the program in order to make the initial shift and also to start the self-study operation.
Argument Essay Writing
precess guidance of Alphago No often starts off on your own, just the fundamental guidelines in the sport by itself are entered to the program. After that, the program starts fidgeting with itself, making some of the most unique movements through the beginning. After a short time, the program begins to build up know-how and its degree of perform increases noticeably. In 24 several hours of these types of personal-examine, the Alphago Zero programme acquired the „superhuman” degree of chess, Guo, and los angeles-Saguia (Japanese chess), scoring each and every time a strong victory in excess of one other application while using the headline of society winner in personal computer programs within this see. |
Study proves that dogs are smarter than cats
You mutt be kidding Dogs are smarter than cats fact
They might chew your shoes, occasionally pee on the rug, or snarf down your entire dinner the minute you turn your head, but it turns out your family dog is measurably smarter than your cat. A 2010 study from Oxford University claimed that dogs' brains are continually evolving while cats' brains haven't changed since they were domesticated about 8,000 years ago.
It was the first study to actually count the number of cortical neurons in the brains of a number of carnivores, including cats and dogs.
The researchers of the study concluded that dogs have dogs have cerebral cortexes with twice as many neurons - the brain cells responsible for thought, planning and behavior - when compared to cats.
The study looked at eight species of carnivores, including cats, dogs, ferrets, mongooses, raccoons, hyenas, lions and brown bears.
Because dog brains possess more neurons, scientists say they probably are capable of doing more complex and flexible things with their lives than cats can.
The researchers picked carnivorans to study due to their diversity and large range of brain sizes as well as the fact that they include both domesticated and wild species.
"We do know that there is variation across individuals, but that's really not an issue when we're comparing species that vary so markedly in brain size or numbers of neurons", she said.
They also noted that the bear's brain is 10 times larger than a cat's, yet has the same amount of neurons.
"I would bet money on a large dog over a cat any time", Herculano-Houzel said in a Vanderbilt-produced video.
Study leader Professor Suzana Herculano-Houzel admitted she was a "dog person" but insisted that didn't impact her findings.
According to the neuroscientist, studying the brains of different species teaches an important lesson: "Diversity is enormous". Yes, there are recognizable patterns, but there are multiple ways that nature has found of putting brains together.
Related News:
Most liked
Natural disaster shakes DE , tremors felt in Maryland
The extremely rare tremor, which happened at around 4:47 p.m., was felt by some New Jerseyans while barely noticed by others. It caused damage to public buildings, pipes and monuments, most notably the National Cathedral and the Washington Monument.
White House considering major shake-up of Trump's national security team
Both CNN and Bloomberg subsequently reported that the White House is weighing replacing Tillerson with Pompeo. Shortly after Tillerson announced that the USA was in diplomatic contact with Pyongyang, Mr.
French base jumpers set new record of base jumping
Fugen and Reffet known as the " Soul Flyers " are two BASE-jumping experts from France. The pair soar low over the frozen landscape as they approach the small plane.
WhatsApp iOS users can text, view videos simultaneously
This new feature implemented in WhatsApp uses the Picture in Picture concept to view YouTube videos without opening it. YouTube's controversy over violent, predatory videos impersonating as videos for children started about a month ago. |
Caution is needed after a pedestrian's death in Arizona. Still, technology often fails before it can succeed. Failures inform. Real-world testing will be necessary for real-world safety.
This appeared in the Chicago Tribune:
Innovation isn’t an easy road. Every improving technology occasionally lets us down, sometimes with deadly consequences. Look to Uber’s travail in Tempe, Ariz., as the latest example.
Maybe you’ve seen the video from an Uber self-driving SUV of that tragic moment: Elaine Herzberg, 49, is walking her bicycle across multiple lanes of roadway, moving from left to right. Cruising at about 40 mph in the far right lane, the Uber vehicle slams into Herzberg, killing her. A separate camera view shows the vehicle’s human safety driver, there to take control in an emergency, with eyes off the road and looking down before the crash. After impact, the safety driver looks up, stunned.
In assessing what went wrong, there’s a lot to unpack. The growing consensus is that the self-driving car’s technology, as designed, should have detected Herzberg in enough time to brake. That technology includes laser sensors, radar, and front, side and rear cameras — a combination engineered to see better than humans can, and react faster.
The collision happened at night, but a self-driving car’s robot eyes work best at night. Bad weather can interfere with the car’s vision, but the weather was clear. Then there’s the inattentive safety driver, put behind the wheel to intervene in such situations, who happens to have a history of traffic violations.
Herzberg’s death marks the first time a pedestrian has been killed by a self-driving car. Uber, which has been testing self-driving cars in several American cities, has stopped doing so while the Tempe investigation continues. This week, Arizona Gov. Doug Ducey added to Uber’s woes by suspending its driverless testing program in his state, calling the March 18 incident “an unquestionable failure” to safely test self-driving cars.
Some critics want to go further. A group called Consumer Watchdog wants a national moratorium applied to all driverless car enterprises — those of Waymo, Lyft, Ford and others that conduct tests on U.S. roadways — until experts figure out how to fix what went wrong in Arizona. The recoiling is understandable, but it’s shortsighted.
We offer condolences to the victim here, and to her family. But in this as in other avenues of progress, technology often fails before it can succeed. Failures inform. They tell engineers, scientists and innovators what needs to be reworked. And in the fledgling arena of autonomous car technology, on-the-road, real-world testing is the only way these cars can reach a point where they’re safer than having humans behind the wheel.
The human-driven auto, as its use expanded in the early 20th century, had a poor safety record that has markedly improved: In 1921, car use resulted in 24 deaths for every 100 million miles traveled, according to the National Highway Traffic Safety Administration. Today that measure is roughly one death for every 100 million miles.
It behooves Uber and other companies competing to perfect self-driving vehicles to learn from this death in Tempe. The New York Times reports that Uber has struggled to meet its goal of self-driving cars going a relatively scant 13 miles without the safety driver having to take control. Compare that to Waymo’s average of 5,600 miles before driver intervention, or GM-owned Cruise’s 1,200 miles before the driver has to intervene.
Driverless cars have remarkable potential to make streets and highways safer than they’ve ever been. They’ll take out of the equation the barroom drunk who insists on driving home, the reckless speeder who weaves in and out of lanes slalom-style, the distracted driver checking a text while merging onto the Kennedy. But those who would use the death in Tempe to slam the brakes on the development of these vehicles risk keeping all of us from that smarter, safer future. |
3 sickened, 1 death in Bronx Legionnaires' disease cluster
EMBED </>More Videos
Lauren Glassberg reports on Legionnaires' disease sickening 3 and leaving 1 dead in the Bronx.
A cluster of Legionnaires' disease centered on a single apartment building in the Bronx has sickened three people over the past year, leading to one death.
The New York Department of Health stresses that this is not considered an outbreak. The affected building, in Co-Op City, does not have a cooling tower, so they're looking at internal plumbing to see if the bacteria is in there.
FACTS: What is Legionnaires' disease?
The water is safe to drink, but they're advising residents of the building who are over 50 or have underlying medical conditions to avoid showering until the investigation is completed.
"The Health Department is currently investigating three cases of Legionnaires' disease in three connected buildings at Co-op City in the Bronx that occurred in the last 12 months," the health department said in a statement. "All of the patients who became ill had conditions that increase the chances of getting Legionnaires' disease. One of the patients, who was very elderly, has died. The other two individuals have been discharged from the hospital. As always, adults with flu-like symptoms, fever, cough, or difficulty breathing should seek immediate medical attention. Legionella testing should be considered by clinicians based on history, symptoms, and other findings."
Officials said the first case was last year, while the last two were in the last 60 days.
Legionnaires' disease is not contagious and is easily treatable with antibiotics. People get Legionnaires' disease by breathing in water vapor containing the bacteria.
Legionella bacteria is present throughout the environment. Like other types of pneumonia, Legionnaires' disease can be severe and even deadly, especially for people of advanced age and those with a compromised immune system.
Authorities say an average of 200 to 500 Legionnaires' cases are reported in New York city annually, and the Department of Health routinely evaluates the plumbing system of all residential buildings with two or more cases occurring among residents within one year.
At this time, this is not considered an outbreak or related to cooling towers.
The agency has notified elected officials and the community board, and has notified tenants by putting flyers in each apartment. Three buildings share the same plumbing system.
Additionally, because of the community cluster in Co-op City in 2014 associated with a cooling tower, the health department is proactively sampling active cooling towers in the vicinity.
Individuals at higher-risk include those aged 50 or older (especially if they smoke cigarettes), people with chronic lung disease, and those with compromised immune systems. People in these groups should take the following precautions:
--Don't take a shower, even a cool shower, since it could create water vapor (mist). Instead, take a bath, but fill the tub slowly. Try to minimize your time in the bathroom while the tub is filling.
--It's fine to wash dishes, but fill the sink slowly to avoid creating mist.
--It's fine to drink cold water from the tap, but start with cold water when heating water for tea, coffee or cooking.
--You do not need to wear a mask.
--It is important to continue to wash your hands.
After the outbreak in the South Bronx in 2015, the health department announced a comprehensive plan to reduce the risk of Legionnaires' disease outbreaks in the city, including implementation of the toughest cooling tower regulations in the nation, the hiring of more inspectors and training of existing city personnel to inspect towers if needed, expanding lab capacity, and speeding up community notification.
* More Bronx news
* Send us a news tip
* Download the abc7NY app for breaking news alerts
Related Topics:
healthlegionnaires' diseasehealthCo-op CityNew York CityBronx |
SQL Interview Questions
1) What is SQL?
SQL stands for structured query language. It is a database language used for database creation, deletion, fetching rows and modifying rows etc. sometimes it is pronounced as se-qwell.
2) When SQL appeared?
It appeared in 1974.
3) What are the usages of SQL?
• To execute queries against a database
• To retrieve data from a database
• To inserts records in a database
• To updates records in a database
• To delete records from a database
• To create new databases
• To create new tables in a database
• To create views in a database
4) Does SQL support programming?
No, SQL doesn't have loop or Conditional statement. It is used like commanding language to access databases.
5) What are the subsets of SQL?
1. Data definition language (DDL)
2. Data manipulation language (DML)
3. Data control language (DCL)
6) What is data definition language?
Data definition language(DDL) allows you to CREATE, ALTER and DELETE database objects such as schema, tables, view, sequence etc.
7) What is data manipulation language?
Data manipulation language makes user able to access and manipulate data. It is used to perform following operations.
• Insert data into database
• Retrieve data from the database
• Update data in the database
• Delete data from the database
8) What is data control language?
Data control language allows you to control access to the database. It includes two commands GRANT and REVOKE.
GRANT: to grant specific user to perform specific task.
REVOKE: to cancel previously denied or granted permissions.
9) What are the type of operators available in SQL?
1. Arithmetic operators
2. Logical operators
3. Comparison operator
10) What is the difference between clustered and non clustered index in SQL?
1) One table can have only one clustered index but it can have many non clustered index. (approximately 250).
2) clustered index determines how data is stored physically in table. Actually clustered index stores data in cluster, related data is stored together so it makes simple to retrieve data.
3) reading from a clustered index is much faster than reading from non clustered index from the same table.
4) clustered index sort and store data rows in the table or view based on their key value, while non cluster have a structure separate from the data row.
11) What is the SQL query to display current date?
There is a built in function in SQL called GetDate() which is used to return current timestamp.
12) Which types of join is used in SQL widely?
The knowledge of JOIN is very necessary for an interviewee. Mostly used join is INNER JOIN and (left/right) OUTER JOIN.
13) What is "TRIGGER" in SQL?
Trigger allows you to execute a batch of SQL code when an insert, update or delete command is executed against a specific table.
Actually triggers are special type of stored procedures that are defined to execute automatically in place or after data modifications.
14) What is self join and what is the requirement of self join?
15) What are set operators in SQL?
Union, intersect or minus operators are called set operators.
16) What is a constraint? Tell me about its various levels.
Constraints are representators of a column to enforce data entity and consistency. There are two levels :
1. column level constraint
2. table level constraint
17) Write an SQL query to find names of employee start with 'A'?
1. SELECT * FROM Employees WHERE EmpName like 'A%'
18) Write an SQL query to get third maximum salary of an employee from a table named employee_table.
1. SELECT TOP 1 salary
2. FROM (
3. SELECT TOP 3 salary
4. FROM employee_table
5. ORDER BY salary DESC ) AS emp
6. ORDER BY salary ASC;
19) What is the difference between DELETE and TRUNCATE statement in SQL?
1)DELETE is a DML command.TRUNCATE is a DDL command.
2)We can use WHERE clause in DELETE command.We cannot use WHERE clause with TRUNCATE
3)DELETE statement is used to delete a row from a tableTRUNCATE statement is used to remove all the rows from a table.
4)DELETE is slower than TRUNCATE statement.TRUNCATE statement is faster than DELETE statement.
5)You can rollback data after using DELETE statement.It is not possible to rollback after using TRUNCATE statement.
20) What is ACID property in database?
A single logical operation of a data is called transaction.
ritesh pandey resume click for download
Ritesh Pandey Resume
संपर्क के लिए विवरण भरे
Send message |
This is my first time doing any sort of spatial data visualization in R, and I'm stuck on a particular issue. I would like to clip a spatial polygon (specified by a series of lat/long coordinates) according to a world map, such that any part of the polygon which overlaps with a map polygon is removed. Using what I have in the below code as an example, I want to clip the rectangular spatial polygon so that only oceanic portions of the polygon remain.
I've found examples of how to retain the intersection between two spatial polygons, but I want to do the opposite. Perhaps there is a way to define the intersection, then "subtract" that from the polygon I wish to clip?
This might be a really basic question, but any tips will be appreciated!
Specify lat/long data:
x_coord <- c(25, 25, 275, 275)
y_coord <- c(20, -50, -50, 20)
xy.mat <- cbind(x_coord, y_coord)
Convert to spatial polygons object:
poly = Polygon(xy.mat)
polys = Polygons(list(poly),1)
spatial.polys = SpatialPolygons(list(polys))
proj4string(spatial.polys) = CRS("+proj=longlat +datum=WGS84 +no_defs
+ellps=WGS84 +towgs84=0,0,0")
Convert to spatial polygons data frame and export as shapefile:
df = data.frame(f=99.9)
spatial.polys.df = SpatialPolygonsDataFrame(spatial.polys, df)
writeOGR(obj=spatial.polys.df, dsn="tmp", layer="polygon",
driver="ESRI Shapefile")
Plot world map and add .shp file:
map("world", wrap=c(0,360), resolution=0, ylim=c(-60,60))
shp <- readOGR("polygon.shp")
plot(shp, add=TRUE, col="blue", border=FALSE)
up vote 4 down vote accepted
Here is a solution that stays in sf the entire time (I don't know sp), and illustrates constructing an sf object from scratch. st_difference create the geometry you want exactly, and then plotting can be done with the base plot method or the development version of ggplot which has geom_sf. I used map data from maps and rnaturalearth for this, you can adapt to your particular situation. Wrapping around the dateline is a little finicky regardless unfortunately.
#> Linking to GEOS 3.6.1, GDAL 2.2.0, proj.4 4.9.3
#> Attaching package: 'maps'
#> The following object is masked from 'package:purrr':
#> map
polygon <- cbind(x_coord, y_coord) %>%
st_linestring() %>%
st_cast("POLYGON") %>%
st_sfc(crs = 4326, check_ring_dir = TRUE) %>%
st_sf() %>%
st_wrap_dateline(options = c("WRAPDATELINE=YES", "DATELINEOFFSET=180"))
land <- rnaturalearth::ne_countries(returnclass = "sf") %>%
ocean <- st_difference(polygon, land)
#> although coordinates are longitude/latitude, st_difference assumes that they are planar
plot(st_geometry(polygon), add = TRUE)
plot(st_geometry(ocean), add = TRUE, col = "blue")
ggplot() +
theme_bw() +
borders("world") +
geom_sf(data = ocean)
Created on 2018-03-13 by the reprex package (v0.2.0).
If I understand correctly what you want you can do it with the sf package using st_difference() and st_union()`.
Base on your code here is what you can do.
# world data
data("wrld_simpl", package = 'maptools')
# load sf package
# coerce sp object to sf
world <- st_as_sf(wrld_simpl)
rectangle <- st_as_sf(spatial.polys)
# difference between world polygons and the rectangle
difference <- st_difference(rectangle, st_union(world))
# coerce back to sp
difference <- as(difference, 'Spatial')
# plot the result
Your Answer
|
Ch.7 Attention Deficit Hyperactivity Disorder
attention deficit hyperactivity disorder
ADHD: 3 diagnostic criteria types
1.predominantly inattentive type
2.predominantly hyperactive-impulsive
3.combined type
Criteria examples to determine subtypes
1.inattention:trouble paying attention to details, difficulty sustaining attention, problems with organization, distractible;
2.hyperactivity:fidgeting, leaving seat at inappropriate times, talking excessively;
3.impulsivity:problems awaiting one’s turn, interrupting others
ADHD prevalence
between 7%-9% of school-age pop. has ADHD.
much more frequent in boys, 2 to 1 ratio.
Identification techniques
medical examination, clinical interview, teacher and parent rating scales, behavioral observations
Medical examination
necessary to rule out medical conditions, such as brain tumors, thyroid problems, or seizure disorders as the cause of inattention &/or hyperactivity
Clinical interview of parents and child
provides info about the child’s physical and psychological characteristics, as well as family dynamics and interaction with peers.
Rating scales
used as an attempt to being some quantification to the identification process.
can be done in classroom or special observation rooms to observe child performing tasks that require sustained attention
ADHD causes
with learning disabilities ADHD most likely results from neurological dysfunction rather than actual brain damage.
Heredity plays a very strong role in causing the neurological dysfunction, with teratogenic and other medical factors also implicated to a lesser degree.
Brain abnormalities
researchers have found relatively consistent abnormalities in brain of people with ADHD- frontal lobes, basal ganglia and cerebellum
Frontal lobes function
executive function: involves ability to regulate one’s own behavior.
Basal ganglia function
responsible for coordination and control of motor behavior
responsible for coordination & control of motor behavior. Only about 10% of brain mass, it contains more than half of all the brain’s neurons.
chemicals that help in sending of messages between neurons in the brain.
2 abnormal neurotransmitters involved in ADHD
dopamine & noradrenaline
Symptoms associated w/ major behavioral characteristics
inattention, hyperactivity, impulsivity
Psychological processes underlying ADHD
Executive functioning, behavioral inhibition
Executive functioning
describes a number of processes involved in controlling & regulating behavior: working memory, inhibitory control, behavioral inhibition & mental flexibility. Controlled by pre/frontal lobes. These characteristics are diminished with ADHD. -hard to stay focused, low academic achievement
Behavioral inhibition
involves the ability to delay a response; interrupt an ongoing response, if the response is deemed inappropriate because of sudden changes in the demands of the task; or protect a response from distracting or competing stimuli. in ADHD problems in ability to wait one’s turn, refrain from interrupting conversations
Adaptive behavior skills
stipulates that intellectual disabilities be defined as impairments in intelligence & adaptive behavior.
Social behavior problems
With ADHD students are more disliked by their peers than those without ADHD. Negative social status is common. End up socially ostracized
Educational considerations
1.classroom structure and teacher direction
2.functional behavioral assessment and contingency-based self-management
Classroom structure and teacher direction
1.reduce stimuli irrelevant to learning & enhancing materials important for learning
2.structuring a program with a strong emphasis on teacher direction
(Cruickshank program)
Functional behavioral assessment (FBA)
involves determining the consequences, antecedents, & setting events that maintain inappropriate behaviors.
Contingency-based self-management
usually involve having people keep track of their own behavior and then receive consequences, usually in the form of rewards, based on their behavior.
Combination of FBA & contingency-based self-management
proven successful in increasing appropriate behavior of elementary & secondary students with ADHD
Role of contingency in contingency-based self-management
reinforcement of some kind, such as social praise or points that can be traded for privileges, is especially important for self-management techniques to be effective.
ADHD medication
Psychostimulants, Strattera, Methylphenidate (Ritalin), Adderall and Vyvnse
stimulate or activate neurological functioning. the most frequent type of medication prescribed for ADHD
an example of a nonstimulant that is also sometimes prescribed for ADHD
Methylphenidate (Ritalin)
most common stimulant prescribed for ADHD
Adderall and Vyvanse
other stimulants also prescribed.
Ritalin function
influences the release of the neurotransmitters dopamine & norepinephrine, enabling the brain’s executive functions to operate more normally.
Ritalin effectiveness
helps students have more normalized behavioral inhibition and executive functioning, leads to better results on parent & teacher rating scales, improved academic achievements, better classroom behavior and homework completion
Ritalin side effect possibilities
insomnia, reduction in appetite, abdominal pain, headaches and irritability.
ADHD medication cautions
should not be prescribed at first sign of medication problem, teachers shouldn’t assume medication will take care of all academic problems students face, dosage levels should be closely monitored, child should not be led that medication serves as substitute to self-responsibility and self-initiative, medication should not be viewed as a panacea by parents/teachers, psychostimulants are a controlled substance must be kept away from siblings/peers etc., communication is key for effective use of medication. |
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Painting of battle between mounted knights
Battle between Hussites and crusaders; Jena Codex, 15th century
The Taborites (Czech Táborité, singular Táborita) were a Radical Hussite faction within the Hussite movement in medieval Lands of the Bohemian Crown.
The Taborites were centered on the Bohemian city of Tábor during the Hussite Wars in the 15th century. The religious reform movement in Bohemia splintered into various religious sects. Besides the Taborites, these included the Adamites, Orebites, Sirotci ("Orphans"), Utraquists and Praguers.[citation needed][dubious ] Because the revolution's impetus came from the burning of John Hus, for the purpose of simplicity many writers have put most of these sects under the umbrella term of "Hussites".
Economically supported by Tábor's control of local gold mines, the citizens joined local peasants to develop a communal society. Taborites announced the Millennium of Christ and declared there would be no more servants and masters, all property would be held in common and there would be no more taxation.[1] They promised that people would return to a state of pristine innocence. Author Murray Bookchin argues that this was an early example of anarcho-communism.[2]
Taborite theology represented one of the most radical departures from that of the medieval Catholic Church. They rejected what they called a veneer of corruption in the Church and insisted on the normativeness of biblical authority. Even though Taborite theologians were versed in scholastic theology, they were among the first intellectuals to break free from centuries-old scholastic methods.
Major figures[edit]
Some of the most outstanding Taborite theologians were Mikuláš Biskupec of Pelhřimov and Prokop Veliký (who died in the Battle of Lipany). These were opposed by Taborite theologians such as Peter Kániš and Martin Húska, who manifested their more radical ideas by desecrating the Eucharistic host.[3] Followers of Kániš included Adamites,[4] and he himself was burnt as a heretic by order of Jan Žižka,[5] the military leader.
Taborites under Žižka[edit]
Jan Žižka commanded his rag-tag Bohemian army in defense against the crusading Imperial Army under Emperor Sigismund. Žižka did not believe that all prisoners should be slain, and often showed clemency to those he defeated. After one battle when his army disobeyed him and killed many prisoners, Žižka ordered the army to pray for forgiveness. This experience partly inspired him to write a famous military code of conduct – "Žižkův vojenský řád" – a document partly inspired by the biblical book of Deuteronomy. Žižka eventually left Tabor because that community became too radical for his beliefs[citation needed] and took over the leadership of the more moderate Orebites in Hradec Králové. In response to the numerous attacks launched against Bohemia, the Taborites and Orebites often set aside their religious differences and cooperated militarily.
Once the external threat was removed by Hussite victories, the various Hussite factions turned on each other. Finally, after twenty years, the power of the Taborites was broken with the Battle of Lipany on May 30, 1434, during which 13,000 of the 18,000-strong army were killed. In 1437 the Taborites signed a treaty with Sigismund. The Taborites lost control of Tabor in 1452.
Even though the Taborites ceased to play an important political role, their theological thinking strongly influenced the foundation and rise of the Unity of the Brethren (Unitas Fratrum) in 1457, today in English called the Moravian Church.
See also[edit]
Further reading[edit]
External links[edit] |
Chapter 5 Scrubbing Data
Two chapters ago, in Step 1 of the OSEMN model for data science, we looked at how to obtain data from a variety of sources. It’s not uncommon for this data to have missing values, inconsistencies, errors, weird characters, or uninteresting columns. Sometimes we only need a specific portion of the data. And sometimes we need the data to be in a different format. In those cases, we have to scrub, or clean, the data before we can move on to Step 3: Exploring Data.
The data we obtained in Chapter 3 can come in a variety of formats. The most common ones are plain text, CSV, JSON, and HTML/XML. Since most command-line tools operate on one format only, it is worthwhile to be able to convert data from one format to another.
CSV, which is the main format we’re working with in this chapter, is actually not the easiest format to work with. Many CSV data sets are broken or incompatible with each other because there is no standard syntax, unlike XML and JSON.
Once our data is in the format we want it to be, we can apply common scrubbing operations. These include filtering, replacing, and merging data. The command line is especially well-suited for these kind of operations, as there exist many powerful command-line tools that are optimized for handling large amounts of data. Tools that we’ll discuss in this chapter include classic ones such as: cut (Ihnat, MacKenzie, and Meyering 2012) and sed (Fenlason et al. 2012), and newer ones such as jq (Dolan 2014) and csvgrep (Groskopf 2014e).
The scrubbing tasks that we discuss in this chapter not only apply to the input data. Sometimes, we also need to reformat the output of some command-line tools. For example, to transform the output of uniq -c to a CSV data set, we could use awk (Brennan 1994) and header:
If your data requires additional functionality than that is offered by (a combination of) these command-line tools, you can use csvsql. This is a new command-line tool that allow you to perform SQL queries directly on CSV files. And remember, if after reading this chapter you still need more flexibility, you’re free to use R, Python, or whatever programming language you prefer.
The command-line tools will be introduced on a need-to-use basis. You will notice that sometimes we can use the same command-line tool to perform multiple operations, or vice versa, multiple command-line tools to perform the same operation. This chapter is more structured like a cookbook, where the focus is on the problems or recipes, rather than on the command-line tools.
5.1 Overview
In this chapter, you’ll learn how to:
• Convert data from one format to another.
• Apply SQL queries to CSV.
• Filter lines.
• Extract and replace values.
• Split, merge, and extract columns.
5.2 Common Scrub Operations for Plain Text
In this section we describe common scrubbing operations for plain text. Formally, plain text refers to a sequence of human-readable characters and optionally, some specific types of control characters (for example a tab or a newline) (see: Examples include: e-books, emails, log files, and source code.
For the purpose of this book, we assume that the plain text contains some data, and that it has no clear tabular structure (like the CSV format) or nested structure (like the JSON and HTML formats). We discuss those formats later in this chapter. Although these operations can also be applied to CSV, JSON and XML/HTML formats, keep in mind that the tools treat the data as plain text.
5.2.1 Filtering Lines
The first scrubbing operation is filtering lines. This means that from the input data, each line will be evaluated whether it may be passed on as output. Based on Location
The most straightforward way to filter lines is based on their location. This may be useful when you want to inspect, say, the top 10 lines of a file, or when you extract a specific row from the output of another command-line tool. To illustrate how to filter based on location, let’s create a dummy file that contains 10 lines:
We can print the first 3 lines using either head, sed, or awk:
Similarly, we can print the last 3 lines using tail (Rubin, MacKenzie, Taylor, et al. 2012):
You can also you use sed and awk for this, but tail is much faster.
Removing the first 3 lines goes as follows:
Please notice that with tail you have to add one.
Removing the last 3 lines can be done with head:
You can print (or extract) specific lines (4, 5, and 6 in this case) using a either sed, awk, or a combination of head and tail:
Print odd lines with sed by specifying a start and a step, or with awk by using the modulo operator:
Printing even lines works in a similar manner: Based on Pattern
Sometimes you want to extract or remove lines based on their contents. Using grep, the canonical command-line tool for filtering lines, we can print every line that matches a certain pattern or regular expression. For example, to extract all the chapter headings from Alice’s Adventures in Wonderland:
Here, -i means case-insensitive. We can also specify a regular expression. For example, if we only wanted to print out the headings which start with The:
Please note that you have to specify the -E command-line argument in order to enable regular expressions. Otherwise, grep interprets the pattern as a literal string. Based on Randomness
When you’re in the process of formulating your data pipeline and you have a lot of data, then debugging your pipeline can be cumbersome. In that case, sampling from the data might be useful. The main purpose of the command-line tool sample (Janssens 2014f) is to get a subset of the data by outputting only a certain percentage of the input on a line-by-line basis.
Here, every input line has a one percent chance of being forwarded to jq. This percentage could also have been specified as a fraction (1/100) or as a probability (0.01).
sample has two other purposes, which can be useful when you’re in debugging. First, it’s possible to add some delay to the output. This comes in handy when the input is a constant stream (for example, the Twitter firehose), and the data comes in too fast to see what’s going on. Secondly, you can put a timer on sample. This way, you don’t have to kill the ongoing process manually. To add a 1 second delay between each output line to the previous command and to only run for 5 seconds:
In order to prevent unnecessary computation, try to put sample as early as possible in your pipeline (this argument holds any command-line tool that reduces data, like head and tail). Once you’re done debugging you can simply take it out of the pipeline.
5.2.2 Extracting Values
To extract the actual chapter headings from our example earlier, we can take a simple approach by piping the output of grep to cut:
Here, each line that’s passed to cut is being split on spaces into fields, and then the third field to the last field is being printed. The total number of fields may be different per input line. With sed we can accomplish the same task in a much more complex manner:
(Since the output is the same it’s omitted by redirecting it to /dev/null.) This approach uses a regular expression and a back reference. Here, sed also takes over the work done by grep. This complex approach is only advisable when a simpler one would not work. For example, if chapter was ever part of the text itself and not just used to indicate the start of a new chapter. Of course there are many levels of complexity which would have worked around this, but this was to illustrate an extremely strict approach. In practice, the challenge is to find a good balance between complexity and flexibility.
It’s worth noting that cut can also split on characters positions. This is useful for when you want to extract (or remove) the same set of characters per input line:
grep has a great feature that outputs every match onto a separate line:
But what if we wanted to create a data set of all the words that start with an a and end with an e. Well, of course there’s a pipeline for that too:
5.2.3 Replacing and Deleting Values
You can use the command-line tool tr, which stands for translate, to replace individual characters. For example, spaces can be replaced by underscores as follows:
If more than one character needs to be replaced, then you can combine that:
tr can also be used to delete individual characters by specifying the argument -d:
Here, we’ve actually used two more features. First we’ve specified a set of characters (all lowercase letters). Second we’ve indicated that the complement -c should be used. In other words, this command only retains lowercase letters. We can even use tr to convert our text to uppercase:
The latter command is preferable because that also handles non-ASCII characters. If you need to operate on more than individual characters, then you may find sed useful. We’ve already seen an example of sed with extracting the chapter headings from Alice in Wonderland. Extracting, deleting, and replacing is actually all the same operation in sed. You just specify different regular expressions. For example, to change a word, remove repeated spaces, and remove leading spaces:
The argument -g stands for global, meaning that the same command can be applied more than once on the same line. We do not need that with the second command, which removes leading spaces. Note that regular expressions of the first and the last command could have been combined into one regular expression.
5.3 Working with CSV
5.3.1 Bodies and Headers and Columns, Oh My!
The command-line tools that we’ve used to scrub plain text, such as tr and grep, cannot always be applied to CSV. The reason is that these command-line tools have no notion of headers, bodies, and columns. What if we wanted to filter lines using grep but always include the header in the output? Or what if we only wanted to uppercase the values of a specific column using tr and leave the other columns untouched? There are multi-step workarounds for this, but they are very cumbersome. We have something better. In order to leverage ordinary command-line tools for CSV, we’d like to introduce you to three command-line tools, aptly named: body (Janssens 2014a), header (Janssens 2014c), and cols (Janssens 2014b).
Let’s start with the first command-line tool, body. With body you can apply any command-line tool to the body of a CSV file, that is, everything excluding the header. For example:
It assumes that the header of the CSV file only spans one row. Here’s the source code for completeness:
It works like this:
• Take one line from standard in and store it as a variable named $header.
• Print out the header.
• Execute all the command-line arguments passed to body on the remaining data in standard in.
Here’s another example. Imagine that we count the lines of the following CSV file:
With wc -l, we can count the number of all lines:
If we only want to consider the lines in the body (so everything except the header), we simply add body:
Note that the header is not used and is also printed again in the output.
The second command-line tool, header allows us, as the name implies, to manipulate the header of a CSV file. The complete source code is as follows:
If no argument are provided, the header of the CSV file is printed:
This is the same as head -n 1. If the header spans more than one row, which is not recommended, you can specify -n 2. We can also add a header to a CSV file:
This is equivalent to echo "count" | cat - <(seq 5). Deleting a header is done with the -d command-line argument:
This is similar to tail -n +2, but it’s a bit easier to remember. Replacing a header, which is basically first deleting a header and then adding one if you look at the above source code, is accomplished with specifying -r. Here, we combine it with body:
And last but not least, we can apply a command to just the header, similar to what the body command-line tool does to the body:
The third command-line tool is called cols, which is similar to header and body in that it allows you to apply a certain command to only a subset of the columns. The code is as follows:
For example, if we wanted to uppercase the values in the day column in the tips data set (without affecting the other columns and the header), we would use cols in combination with body, as follows:
Please note that passing multiple command-line tools and arguments as command to header -e, body, and cols can lead to tricky quoting citations. If you ever run in such problems, it is best to create a separate command-line tool for this and pass that as command.
In conclusion, while it is generally preferable to use command-line tools which are specifically made for CSV data, body, header, and cols also allow you to apply the classic command-line tools to CSV files if needed.
5.3.2 Performing SQL Queries on CSV
In case the command-line tools mentioned in this chapter do not provide enough flexibility, then there is another approach to scrub your data from the command line. The command-line tool csvsql (Groskopf 2014f) allows you to execute SQL queries directly on CSV files. As you may know, SQL is a very powerful language to define operations for scrubbing data; it is a very different way than using individual command-line tools.
If your data originally comes from a relational database, then, if possible, try to execute SQL queries on that database and subsequently extract the data as CSV. As discussed in Chapter 3, you can use the command-line tool sql2csv for this. When you first export data from the database to a CSV file, and then apply SQL, it is not only slower, but there is also a possibility that the column types are not correctly inferred from the CSV data.
In the scrubbing tasks below, we’ll include several solutions that involve csvsql. The basic command is this:
If you pass standard input to csvsql, then the table is named stdin. The types of the column are automatically inferred from the data. As you will see later, in the combining CSV files section, you can also specify multiple CSV files. Please keep in mind that csvsql employs SQLite dialect. While SQL is generally more verbose than the other solutions, it is also much more flexible. If you already know how to tackle a scrubbing problem with SQL, then there’s no shame in using it from the command line!
5.4 Working with XML/HTML and JSON
As we have seen in Chapter 3, our obtained data can come in a variety of formats. The most common ones are plain text, CSV, JSON, and HTML/XML. In this section we are going to demonstrate a couple of command-line tools that can convert our data from one format to another. There are two reasons to convert data.
First, oftentimes, the data needs to be in tabular form, just like a database table or a spreadsheet, because many visualization and machine learning algorithms depend on it. CSV is inherently in tabular form, but JSON and HTML/XML data can have a deeply nested structure.
Second, many command-line tools, especially the classic ones such as cut and grep, operate on plain text. This is because text is regarded as a universal interface between command-line tools. Moreover, the other formats are simply younger. Each of these formats can be treated as plain text, allowing us to apply such command-line tools to the other formats as well.
Sometimes we can get away with applying the classic tools to structured data. For example, by treating the JSON data below as plain text, we can change the attribute gender to sex using sed:
$ sed -e 's/"gender":/"sex":/g' data/users.json | fold | head -n 3
Like many other command-line tools, sed does not make use of the structure of the data. Better is to either use a command-line tool that makes use of the structure of the data (such as jq which we discuss below), or first convert the data to a tabular format such as CSV and then apply the appropriate command-line tool.
We’re going to demonstrate converting XML/HTML and JSON to CSV through a real-world use case. The command-line tools that we’ll be using here are: curl, scrape (Janssens 2014g), xml2json (Parmentier 2014), jq (Dolan 2014), and json2csv (Czebotar 2014).
Wikpedia holds a wealth of information. Much of this information is ordered in tables, which can be regarded as data sets. For example, the page contains a list of countries and territories together with their border length, their area, and the ration between the two.
Let’s imagine that we’re interested in analyzing this data. In this section, we’ll walk you through all the necessary steps and their corresponding commands. We won’t go into every little detail, so it could be that you won’t understand everything right away. Don’t worry, we’re confident that you’ll get the gist of it. Remember that the purpose of this section is to demonstrate the command line. All tools and concepts used in this section (and more) will be explained in the subsequent chapters.
The data set that we’re interested in, is embedded in HTML. Our goal is to end up with a representation of this data set that we can work with. The very first step is to download the HTML using curl:
The option -s causes curl to be silent and not output any other information but the actual HTML. The HTML is saved to a file named data/wiki.html. Let’s see how the first 10 lines look like:
That seems to be in order. (Note that we’re only showing the first 79 characters of each line so that output fits on the page.)
Using the developer tools of our browser, we were able to determine that the root HTML element that we’re interested in is a <table> with the class wikitable. This allows us to look at the part that we’re interest in using grep (the -A command-line argument specifies the number of lines we want to see after the matching line):
We now actually see the countries and their values that we first saw in the screenshot. The next step is to extract the necessary elements from the HTML file. For this we use the scrape tool:
The value passed to argument -e, which stands for expression (also with many other command-line tools), is a so-called CSS-selector. The syntax is usually used to style web pages, but we can also use it to select certain elements from our HTML. In this case, we wish to select all <tr> elements or rows (except the first) that are part of a table which belongs to the wikitable class. This is precisely the table that we’re interested in. The reason that we don’t want the first row (specified by :not(first-child)) is that we don’t want the header of the table. This results in a data set where each row represents a country or territory. As you can see, we now have a <tr> elements that we’re looking for, encapsulated in <html>` and ’<body> elements (because we specified the -b argument). This ensures that our next tool, xml2json, can work with it.
As its name implies, xml2json converts XML (and HTML) to JSON.
The reason we convert the HTML to JSON is because there is a very powerful tool called jq that operates on JSON data. The following command extracts certain parts of the JSON data and reshapes it into a form that we can work with:
Now we’re getting somewhere. JSON is a very popular data format, with many advantages, but for our purposes, we’re better off with having the data in CSV format. The tool json2csv is able to convert the data from JSON to CSV:
The data is now in a form that we can work with. Those were quite a few steps to get from a Wikipedia page to a CSV data set. However, when you combine all of the above commands into one, you will see that it’s actually really concise and expressive:
That concludes the demonstration of conversion XML/HTML to JSON to CSV. While jq can perform much more operations, and while there exist specialized tools to work with XML data, in our experience, converting the data to CSV format as quickly as possible tends to work well. This way, you can spend more time becoming proficient at generic command-line tools, rather than very specific tools.
5.5 Common Scrub Operations for CSV
5.5.1 Extracting and Reordering Columns
Columns can be extracted and reordered using the command-line tool: csvcut (Groskopf 2014g). For example, to keep only the columns in the Iris data set that contain numerical values and reorder the middle two columns:
Alternatively, we can also specify the columns we want to leave out with -C, which stands for complement:
Here, the included columns are kept in the same order. Instead of the column names, you can also specify the indices of the columns, which start at 1. This allows you to, for example, select only the odd columns (should you ever need it!):
If you’re certain that there are no comma’s in any of the values, then you can also use cut to extract columns. Be aware that cut does not reorder columns, as is demonstrated with the following command:
As you can see, it does not matter in which order we specify the columns with -f, with cut they will always appear in the original order. For completeness, let’s also take a look at the SQL approach for extracting and reordering the numerical columns of the Iris data set:
5.5.2 Filtering Lines
The difference between filtering lines in a CSV file as opposed to a plain text file is that you may want to base this filtering on values in a certain column, only. Filtering on location is essentially the same, but you have to take into account that the first line of a CSV file is usually the header. Remember that you can always use the body command-line tool if you want to keep the header:
When it comes down to filtering on a certain pattern within a certain column, we can use either csvgrep, awk, or, of course, csvsql. For example, to exclude all the bills of which the party size was 4 or less:
Both awk and csvsql can also do numerical comparisons. For example, to get all the bills above 40 USD on a Saturday or a Sunday:
The csvsql solution is more verbose but is also more robust as it uses the names of the columns instead of their indexes:
It should be noted that the flexibility of the WHERE clause in an SQL query cannot be easily matched with other command-line tools, as SQL can operate on dates and sets, and form complex combinations of clauses.
5.5.3 Merging Columns
Merging columns is useful for when the values of interest are spread over multiple columns. This may happen with dates (where year, month, and day could be separate columns) or names (where the first name and last name are separate columns). Let’s consider the second situation.
The input CSV is a list of contemporary composers. Imagine our task is to combine the first name and the last name into a full name. We’ll present four different approaches for this task: sed, awk, cols + tr, and csvsql. Let’s have a look at the input CSV:
The first approach, sed, uses two statements. The first is to replace the header and the second is a regular expression with back references applied to the second row onwards:
The awk approach looks as follows:
The cols approach in combination with tr:
Please note that csvsql employ SQLite as the database to execute the query and that || stands for concatenation:
What if last_name would contain a comma? Let’s have a look at the raw input CSV for clarity sake:
Well, it appears that the first three approaches fail; all in different ways. Only csvsql is able to combine first_name and full_name:
Wait a minute! What’s that last command? Is that R? Well, as a matter of fact, it is. It’s R code evaluated through a command-line tool called Rio (Janssens 2014e). All that we can say at this moment, is that also this approach succeeds at merging the two columns. We’ll discuss this nifty command-line tool later.
5.5.4 Combining Multiple CSV Files Concatenate Vertically
Vertical concatenation may be necessary in cases where you have, for example, a data set which is generated on a daily basis, or where each data set represents a different, say, market or product. Let’s simulate the latter by splitting up our beloved Iris data set into three CSV files, so that we have something to combine again. We’ll use fieldsplit (Hinds et al. 2010), which is part of the CRUSH suite of command-line tools:
Here, the command-line arguments specify: the delimiter (-d), that we want to keep the header in each file (-k), the column whose values dictate the possible output files (-F), the relative output path (-p), and the filename suffix (-s), respectively. Because the species column in the Iris data set contains three different values, we end up with three CSV files, each with 50 data points and a header:
You could just concatenate the files back using cat and removing the headers of all but the first file using header -d as follows:
Note that we’re merely using sed to only print the header and the first three body rows that belonged to the second file in order to illustrate success. While this method works, it’s easier (and less prone to errors) to use csvstack (Groskopf 2014h):
If the species column did not exist, you can create a new column based on the filename using csvstack:
Alternatively, you could specify the group names using -g:
The new column class is added at the front. If you’d like to change the order you can use csvcut as discussed earlier in this section. Joining
Sometimes data cannot simply by combined by vertical or horizontal concatenation. In some cases, especially in relational databases, the data is spread over multiple tables (or files) in order to minimize redundancy. Imagine we wanted to extend the Iris data set with more information about the three types of Iris flowers, namely the USDA identifier. It so happens that we have separate CSV file with these identifiers:
What this data set and the Iris data set have in common is the species column. We can use csvjoin (Groskopf 2014i) to join the two data sets:
Of course we can also use the SQL approach using csvsql, which is, as per usual, a bit longer (but potentially much more flexible):
5.6 Further Reading
• Molinaro, Anthony. 2005. SQL Cookbook. O’Reilly Media.
• Dougherty, Dale, and Arnold Robbins. 1997. Sed & Awk. 2nd Ed. O’Reilly Media. |
Search icone
Search and publish your papers
How Globalized are Cities in the Developing World?
Or download with : a doc exchange
About the author
About the document
Published date
documents in English
research papers
7 pages
0 times
Validated by
0 Comment
Rate this document
1. Introduction
2. The poor cities: Vibrant hubs of global economic and cultural activity
3. Cultural globalization
4. Examples of cultural globalization is the case of India
5. Globalization between India and the West
6. Scholte: A view from both sides of the homogenization versus heterogenization argument
7. Cities: At the heart of global economic integration
8. The consequences of extreme economic globalization
9. Conclusion
10. Bibliography
Asking ?how globalized' a city is quite a loaded question; to determine or quantify the degree of globalization within a city is quite a arduous task. Globalization isn't measurable in neat increments; it isn't a static characteristic nor does it comprise static components. Diverse cities possess different degrees of globalization, and the attempt to quantify these levels seems highly problematic. This situation additionally becomes even more tricky when we consider the word globalization- not only is it quite difficult to measure, but furthermore, what is it we are measuring? There are a wealth of diverse explanations, definitions and assessments of globalization as different theorists aim to provide their conceptualizations of the varied ways in which a city can become globalized. Some theorists emphasise the economic, while others stress the cultural and still others gage globalization geographically or according to the level of international interconnectedness with the western world.
[...] Furthermore, in Appadurai's analysis of cultural globalization, he takes the breakdown a step further. Appadurai distinguishes five strands of global "scapes," that cross across cultural boundaries: ethnoscapes, the landscape of persons who constitute the shifting world in which people live, technoscapes, the global configuration of technologies moving at high speeds across previously impermeable borders, financescapes, the global grid of currency speculation and capital transfer, mediascapes, the distribution of the capabilities to produce and disseminate information and the large complex repertoire of images and narratives generated by these capabilities, ideoscapes, ideologies of states and counter- ideologies of movements, around which nation-states have organized their political cultures. [...]
[...] The world's most ?globalized' cities could be viewed as the ones in which the economies are thriving with the capitalist system at work and their level of interconnectedness and integration within the world economy is high. However, these aforementioned cities wield great power and are vital markets, but do not afford their inhabitants the most basic resources. These global cities, the most globalized cities that is, are central hubs to global economic markets but allow for marginalized residents who lack basic urban liveability. [...]
[...] ?Hybrids of Western and Indian cultural types are routine, and it appears that on some level localization is essential for success in the Indian market.? (Scholte, 92) Through the integration of Western and Indian culture, a hybrid model emerges which is more readily accepted. One example of this hybrid model can be seen in the dispersion and popularity of martial arts through the medium of film and television. The spread of martial arts a rich illustration of the ways in which the long-standing martial arts traditions (has been) reformulated to meet the fantasies of contemporary youth populations (and) create new cultures (Appadurai, 305) For tangible examples of this, we can look at the prominence of American martial arts films, which integrate Western scripts with Asian martial practices and performances, to construct an American-Asian hybrid. [...]
Similar documents you may be interested in reading.
How is sexuality and sexual behavior in the developing world shaped by globalization?
Social studies | Sociology | Presentation | 05/19/2008 | .doc | 5 pages
1870-1914: Global economy, nationalism and the First World War
Social studies | Educational studies | Presentation | 04/02/2012 | .doc | 5 pages
Top sold for economics
International financial management: Impact of International criminality
'Development as Freedom' by Amartya Sen
|
Academic journal article Communications of the IIMA
A Comparative Analysis of Speech Recognition Platforms
Academic journal article Communications of the IIMA
A Comparative Analysis of Speech Recognition Platforms
Article excerpt
Speech recognition (also known as automatic speech recognition) converts spoken words to text (Jurafsky & Martin, 2000). It is a broad term which means it can recognize almost anybody's speech--such as in a call centre system designed to recognize many voices. The performance of speech recognition systems is usually specified in terms of accuracy and speed (Allen, 1995). Accuracy may be measured in terms of performance accuracy which is usually rated with word error rate (WER), whereas speed is measured with the real time factor. Substantial efforts have been devoted in the last decade to the test and evaluation of speech recognition in fighter aircraft, or the training for military (or civilian) air traffic controllers (ATC). Speech Recognition in the field of telephony is now commonplace and in the field of computer gaming and simulation is becoming more widespread (Flach, 2004). People with disabilities are another part of the population that benefit from using speech recognition programs.
In telecommunications, Interactive Voice Response (IVR) systems allow customers to access a company's database via a telephone touchtone keypad or by speech recognition. They can respond with pre-recorded or dynamically generated audio to further direct users on how to proceed. Often they are used to control functions where the interface can be broken down into a series of simple menu choices. In telecommunications applications, such as customer support lines, IVR systems generally scale well to handle large call volumes. However, the use of such systems is significantly impacted by several extraneous factors; among which are noise, accent, casual speech styles and medium of speaking (Handset, headset, speakerphone, and cell phone). However, there have been significant advances in recent years. Automatic speech recognition capabilities now permit us to use speech as an interface for dictation and for information access. In such applications, the interactivity of the system should be such that the user experience is as good as a human experience; otherwise users will drift away from its use. IVR technology is also being introduced into automobile systems for hands-free operation. Current deployment in automobiles revolves around satellite navigation, audio and mobile phone systems. This paper is an attempt to compare three different platforms in terms of their ability to adequately recognize the utterances made by callers into an airline agency, and classify them correctly. Essentially, we are trying to determine how well the utterances collected, are recognized, and properly classified into their stipulated categories.
Consider an airline agency in which there are six (6) possible options available to the caller as shown in Table 1 below.
Table 1: Table of caller options.
1: Reservations To make reservations for a flight
2: Flight Status To obtain information about a flight
3: Reconfirmation To reconfirm a flight
4: Agent To select a seat on a flight with existing
5: Seat Selection To speak to an agent
6: Other Any other utterance
For each of these options, a grammar base is developed to accommodate different possible permutations for a caller to indicate their intent--so as to avoid re-prompts. An utterance like "Make a Reservation" will have several alternative forms that are deemed to be synonymous caller inputs as shown in the Table 2 below:
Table 2: Confidence thresholds for utterance classification.
Platform High Medium Low
Confidence Confidence Confidence
Threshold Threshold Threshold
Platform A 0.4-1.00 0.3-0.4 0-0.3
Platform B 0.3-1.00 0.25-0.3 0-0.25
Platform C 0.4-1.00 0.25-0.3 0-0.25
The quality of the recognizer is enhanced by a large grammar base. The larger the grammar base, the more efficient the recognizer, resulting in a higher probability that the recognition will occur at the first attempt--thereby reducing the number of re-prompts. …
Search by... Author
Show... All Results Primary Sources Peer-reviewed
|
Single nuclei RNA-Seq supplies snapshot of gene expression across brain
from by Ann Griswold
A new tool provides speedy analysis of gene expression patterns in individual neurons from postmortem brain tissue. Researchers have used the method to compare the genetic signatures of more than 3,000 neurons from distant brain regions.
Scientists typically use a technique called RNA-Seq to measure gene expression in neurons isolated from postmortem brains. However, analyzing the data from this approach is daunting because the analysis must be done one cell at a time.
The new method combines RNA-Seq with software that allows researchers to analyze the expression patterns of thousands of neurons at once. Researchers from UCSD described the automated technique, called single-nucleus RNA sequencing (SNS), in June in Science.
The researchers tested the method on postmortem brain tissue from a 51-year-old woman with no known neurological illnesses. They used a laser to dissect 3,227 neurons from six brain areas, including those involved in language, cognition, vision and social behavior. They then performed RNA-Seq on the cells, getting a readout for RNAs produced in each cell.
The software identifies genes by matching a short segment of each RNA to a gene on a reference map of the human genome. The researchers then quantified each gene’s expression level.
Overview of single nuclei sampling methodology
A. Schematic of human brain at the level of BA8 showing approximate region sampled, typical tissue quantity processed for fluorescent activated cell sorting (FACS), the approximate proportion of NeuN+ nuclei obtained, the quantity of NeuN+ nuclei needed for a single C1 loading, and the average single nuclei capture rate. Expected sample scaling and minimal tissue needed for a single C1 experiment is summarized. B. Samples generated using pooled sorted NeuN+ nuclei from BA8, BA10, BA17, BA21, BA22 and BA41/42 as well as matching tissue sections were analyzed for expression of oligodendrocyte (Oligo.), astrocyte (Astro.), endothelial (Endo.) and neuronal (Neuro.) marker genes (17). Violin plots show expression values for associated nuclear (Nuc.) and tissue (Tiss.) sample groupings. C. Data sets from ~120 pooled nuclei derived from either BA21 or BA17 were used to confirm enrichment for neurons or glia in NeuN+ and NeuN- sorts, respectively. D. Histograms showing the frequency of all single NeuN+ nuclei analyzed in this study binned by level of RBFOX3 (NeuN) expression. Neuronal nuclei were distinguished on the basis of either SLC17A7 (excitatory) or GAD1 (inhibitory) marker gene expression.
The process correctly identified the subtypes of 2,253 neurons that ramp up brain activity and 972 neurons that dampen it. Within these two broad classes, the neurons fell into 16 groups based on their location and their origin in the developing brain. For example, neurons from the visual cortex show different patterns of gene expression than do neurons from the temporal cortex, which processes hearing and language.
The findings expand the list of features that distinguish neurons from other cells in the brain. Researchers could use the method to identify patterns of gene expression in the brains of people with autism.
Lake BB, Ai R, Kaeser GE, Salathia NS, Yung YC, Liu R, Wildberg A, Gao D, Fung HL, Chen S, Vijayaraghavan R, Wong J, Chen A, Sheng X, Kaper F, Shen R, Ronaghi M, Fan JB, Wang W, Chun J, Zhang K. (2016) Neuronal subtypes and diversity revealed by single-nucleus RNA sequencing of the human brain. Science 352(6293):1586-90. [abstract]
Source –
Leave a Reply
Time limit is exhausted. Please reload CAPTCHA. |
Food makers and foodservice providers are facing increasing risks of litigation from consumers. The risk grows with the parallel rise of foodborne pathogens, such as salmonella, in the food chain.
Carried in eggs, poultry, raw milk and chocolate the salmonella bacteria is a major problem in most countries across the globe, leading to hefty costs for the public and private sector. Recent estimates from the US put total annual costs of the pathogen at a massive $2.3 billion. In industrialized countries, the percentage of people suffering from foodborne diseases each year has been reported to be up to 30 per cent.
Last year the UK’s Food Standards Agency and the Health Protection Agency announced plans to clamp down on salmonella. Their investigations revealed that, since 2002, the country had experienced more than 80 outbreaks of Salmonella enteritidis, with 2000 confirmed and an estimated 6000 potential cases. Many of which were linked to Spanish eggs used in the catering trade.
The UK is still recovering from wide outbreaks of this foodborne pathogen in the 1980s that knocked the local egg industry. Figures now show that the number of cases in England and Wales have nearly halved since this time, dropping from 16,047 cases in 1998 to 9757 cases in 2003, mainly due to industry control programs, including the vaccination of chicken flocks.
Advice from the FSA to the food industry includes ensuring that the eggs are commercially heat-treated and caterers should use pasteurised egg in raw or lightly cooked products. "All products made with Spanish eggs should be thoroughly cooked," warned the government agency.
Sweden is the country with the lowest occurrence of salmonella in the world, whose methods have aroused considerable interest from US and European food production lines. The Swedish method attempts to make ‘a polluted product clean’. The control points are moved backwards in the production chain, including the egg production site, as well as strong focus on hygiene related matters. |
THE annexed illustration represents a perspective view of a sud motor constructed by the writer and put in operation last summer. This mechanical device for utilizing the sun's radiant heat is the result of experiments conducted during a series of twenty years; a successicn of experimental machines of similar general design, but varying is detail, having been built during that period. The leading feature of the siin motor is that of concentrating the radiaDt heat by means of a rectangular trough having a curved bottom lined on the is- side with polished plates so arranged thattheyreflect the sun's rays toward a cylindrical heater placed longitudinally above the trough. This heater. it is scarcely necessary to state, contains the acting medium, steam or air, employed to transfer the solar energy to the motor; the trflsfer being effected by meaDS of cylinders provided with pistons and valves resembling those of motive engines of the ordinary tvoe. that solar energy cannot be rendered avaiJable for producing' motive power, in consequence of the feebleness of solar radiatioD. The great cost of large reflectors, and the difficulty of producing accurate curvature on a large scale, besides the great amount of labor called for in preventing the polished surface from becoming tarDished, are objections which have been supposed to render direct solar energy practically useless for producing mechanical power. The device under consideration overcomes the stated objections by very simple means, as will be seen by the follow- ig description. The 'bottom of the rectangular trough coDsists of straight wooden staves, supported by iron ribs of parabolic curvature secured to the of the trough. On these staves the reflecting plates, consisting of flat window glass silvered od the under side, are fastened. It will be readily understood that the method thus adopted for concentrating the radiant heat does not call for a structure of great accuracy, provided the wooden staves are secured to the iron ribs in such a position that the silvered plates attached to the same reflect the solar rays toward the heater. Fig. 2 represents a transverse section of the latter, part of the bottom of the trough and sections of the reflecting plates; the'direct and reflected solar rays being indicated by vertical aDd diagonal lines. Referring to the illustration, it will be seen that the trough, 11 feet long and 16 feet broad, including a parallel opening in the bottom, 12 in. wide, is sustained-by a light truss attached to each eDd; the heater beiDg supported by vertical plates secured to the truss. The heater is 6M inches in diameter, 11 feet long, exposing 180x9 8=1,274 superficial inches to the action of the reflected solar rays. The reflecting plates, each 3 inches wide and 26 inches loDg, iuter- cept a sunbeam of 130X ISO = 23,400 square in. section. The trough is supported by a central pivot round which it revolves. The change of inclination is effected by means of a horizontal axie—concealed by the trougb—the entire mass beiDg so accurately balanced that a pull of 5 pounds applied at the extremity enables a person to change the inclination or cause the whole to revolve. A single revolution of the motive engine devel o p s more power than needed to turn the trough and regulate its inclination so as to face the sun during a day's operation. The motor shown ' by the illustration is a steam engine, the workiDg cylinder beiDg 6 inches ill diameter with Sin. stroke. The piston rod, passing through the bottom of the cylinder, operates a force pump of 5 in. diameter. By means of an ordinary cross- head secured to the piston rod below the steam cylinder, and by ordinary connecting rods, motion is imparted to a crank shaft and fly wheel, applied at the top of I he engi ne frame; the object of this arrangement beiDg that of showing the capability of the engiDe to work either pumps or mills. It should be Doticed that the flexible steam pipe employed to convey the steam to tht' engine, as well as the steam chamber attached to the upper end of the heater, have been excluded iD the illustration. The average speed of the engine during the trials last summer was 120 turns per minute, the absolute pressure on the working piston beiDg 35 lb. per square inch. The steam was worked expansively iD the ratio of 1 to 3, with a nearly perfect vacuum kept up in the condenser in closed in the pedestal which lupporti the engine frame, In view of the foregoiDg, experts Deed not be told that the sun motor can be carried out od a sufficient scale to benefit very materially the sunburnt regions of our planet. With reference to solar temperature, the power developed by the sun motor establishes relations between diffusion and energy of solar radiatioD which show that NewtoD's estimate of solar temperature must be accepted. The following demonstration, based on the foregoiDg particulars, will be readily comprehended. The area of a sphere whose radius is equal to the earth's mean distance from the sun being to the area of the latter as 214'5":1, while the re ERICSSON'S SUN MOTOR, ERECTED AT NEW YORK, 1883. flector of the solar motor intercepts a sunbeam of 23,400 square inches section, it follows that the reflector will receive the heat developed by gg'g.g? = O'50S square inch of the solar surface. Hence, as the heater of the motor contains 1,274 square inches, we establish the fact that the reflected solar rays acting on the same are diffused in the ratio of 1,274:0 '508 = 2,507:1. Practice has now shown that, not withstanding this extreme diffusion, the radiaDt energy transmitted to the reflector, by the sun, is capable of imparting a temperature to the heater of 520° F. above that of the atmosphere. The practical demonstration thus furnished by the sun motor enables us to determine with sufficient exactness the minimum temperature of the solar surface. It also enables us to prove that the calculations made by certain French scientists, indicating that solar temperature does not exceed the temperatures produced in the lahoratory, are wholly erroneous. Had Pouillet known that solar radiation, after suffering a two thousand jive hundred and sevenfold diffusion, retains a radiant energy of 520° F., he would Dot have asserted that the temperature of the solar surface is 1,760° C. Accepting NewtoD's law that “the temperature is as the density of the rays,” the temperature imparted to the heater of the sun motor proves that the temperature of the solar surface cannot be less thaD 520° x 2,507 =1,303,640° F. Let us bear in miDd that, while attempts have been made to establish a much lower temperature than NewtoD's estimate, do demonstration whatever has yet been produced tending to prove that the said law is unsound. On the contrary, the most careful investigations show that the temperature produced byradiant heat emanating from iDcaDdescent spherical bodies diminishes inversely as the diffusion of Ihe heat rays. Again, the writer has proved by bis vacuum actinometer, inclosed in a vessel maintained at a constant temperature during the observations, that for equal zenith distance the intensity of solar radiatioD at midsummer is 5'48° F. less thaD duriDg the wiDter solstice. This diminution of the sun's radiant heat iD aphelion, it will be found, corresponds within 0'40° of the temperature which Newton's law demands. It is pi'oposed to discuss this brauch of the subject more fully on a future occasion. The op ration of ihe sun motor, it will be well to add, furnishes another proof in support of NewtoD's assumption that the energy increases as the density of the rays. The foregoing explanation concerning the reflection of the rays— see Fig. 2—shows that no augmentation of temperature takes place duri ng their transmission from the reflector to the heater. Yet we find that an increase of the number of reflecting plates increases proportionably the power of the motor. Considering that the parallelism of the rays absolutely prevents augmentation of temperature duriDg the transmission, it will be asked: What causes the observed increase of mechanical power? Obviously, the eDergy produced by the increased derrnty of the ravs acting on the heater. The truth of the Newtonian doctrine, that the energy increases as the density of the rays, has thus been verified by a practical test which caDnot be questioned. It is scarcely necessary to observe that our computation of tem perature — 1,303,640° Fah.—does not show maximum solar intensity, the following poiDts, besides atmospheric absorption, Dot having beeD considered: (1) The diminution of eDergy attending the passage of the heat rays through the substaDce of the reflect iDg plates; (2) the diminution consequent od the great amount of lieat radiated by the blackened surface of the heater; (3) the diminution of temperature in the heater caused by convection. J. Ericsson. |
6 January Epiphany Fota, Aghia Theofania--
Epiphany: bodies of water are baptized - blessed by the priests
This holiday commemorates the baptism of Christ in the Jordan River, which explains the custom of boys diving into the waters on that winter day (sea, lake, river) competing to find the cruxifix tossed there by the local priest. Greeks, as everyone remembers, are to this day, a sea faring people.
All bodies of water are blessed by the priests, and in the church, fresh water thus blessed is brought home by the local people to their families to drink, to sprinkle on/in their houses, on their animals, crops, and wine barrels.
In seaside areas, many people bring farm implements or the family icon to wash them in the sea, recalling the ritual of the ancient Athenians who carried the statue of the goddess Athena to the coast at Faliron to purify it in the sea.
The Kalikantzari or Goblins
Going hand in hand with these rites of purification is the banishing to the underground of the 'kalikantzari', best translated as 'hobgoblins', both mischievous and evil, who run around teasing people during the twelve days of Christmas (25 Dec to 6 Jan). They are pictured as goat-like creatures, both dark and hairy, who get into houses through the chimneys (interestingly, just like Santa Claus in the west), with people building fires to keep them out and keeping the ashes later as charms against evil in both home and the fields.
The combination of hairy, goat-like bodies, and mischievousness point quite obviously to their symbolic connection with the pre Christian pagan earty deity Pan. |
Главная / Custom Essay Papers / Tips for students of journalism traits: how exactly to compose text and not «pour water into it»
Life without water is impossible. You cannot make tea, take a shower and go on a boat without it. Therefore we ourselves, in accordance with researchers, comprise from it as much as 80%. In short, water is considered the most of good use substance on the planet earth.
Not in terms of texts! Watery articles, for which there are lots of words and meaning that is little probably one of the most severe issues for novice authors. And frequently this deficiency becomes the main obstacle on the best way to professionalism.
Therefore we will talk about water in the texts today. We are going to understand what it really is, properly learn how to «squeeze» water and how to get it done should not be.
What exactly is ‘the water’ when you look at the text?
Water — these are components of the writing which do not carry semantic load. Water could be words that are individual sentences, paragraphs as well custom writings discount as entire sections of this article. Let me reveal a really «fat» instance:
As training programs, probably one of the most frequent conditions that contemporary families face is choosing the essential wallpaper that is suitable the youngsters’s space. Some individuals believe just a proper professional can handle this difficult task. But, in the current article, we’ll make an effort to show you that virtually everyone else can select wallpaper that is good the youngsters’s space.
This is certainly nearly one water that is continuous. Mcdougal wrote 53 terms, but would not inform us such a thing of good use as well as in vain took away our time.
The less inside our articles of water, the greater. First, the watery text looks unconvincing. The authors often try to hide the lack of facts and insufficient knowledge of the topic for idle talk.
And next, this kind of text is hard to read. Your reader will need to wade through a lot of additional terms to locate at least a grain of meaning. But, likely, he just will not wish to spending some time on this and close the page.
How exactly to correctly «squeeze» a ‘water’
Some believe water can simply be words. Regrettably, often the written text appears gorgeous and smooth, and at the time that is same contains lots of unneeded details and lyrical digressions.
Consequently, to begin with, it is worthwhile to look very carefully at each paragraph and have your self: is it really necessary? Does it work with a layout? Does the question answer your reader? Or even, it is possible to properly take it off. Exactly the same is desirable regarding each proposal.
And just from then on we start to make use of words. For this, we mentally delete each expressed word and appear: did the writing become worse? Has got the meaning changed? Then this word, most likely, was superfluous if not. For example:
Into the inner pocket of one’s handbag you are able to keep your hard earned money and bank charge cards.
It’s hardly essential to make clear that credit cards are «bank», and cash must certanly be «their particular» (and never somebody else’s). Therefore, safely delete these terms:
Into the pocket that is inner of bag you are able to keep money and bank cards.
How will it be wrong to «squeeze» a ‘water’?
In the last few years, dictionaries associated with alleged stop words — words which do not carry semantic load became popular. Your lists is likely to be readily wanted to both you and exchanges, and web sites, plus some authors that are well-known. There are also services that are special make it possible to find stop terms.
At first glance, it may seem it is convenient. The author not any longer has to stress their mind: delete the words just highlighted by this program. But, such a approach that is»progressive can completely kill the quality of the text. This is exactly why:
1. 1. The authors commence to delete words without taking into consideration the meaning. For example, the ongoing solution identified:
Builders can earn much more than $ 100,000 four weeks.
While the writer regarding the automated machine removes stop words, perhaps not noticing that this is associated with the sentence had been distorted, plus it turned into a lie:
Builders earn much more than $ 100,000 per month.
1. 2. Technical push-up of water «dries» the writing. The authors ignore rhythm and readability, so when result they have something similar to this:
Cairo — the main city of Egypt, 10 museums that are major. Probably the most famous could be the Cairo Museum that is egyptian on Square. The exposition is ancient art that is egyptian. Displays: mummies and sarcophagi associated with the priests of Amun, decorations of Queen Ahhotep, things associated with period that is akhenaten.
Friends! let us not forget that the main copywriter tool is a good taste that any program can change. And it’s also we must rely first on him that.
Добавить комментарий
Ваш e-mail не будет опубликован. Обязательные поля помечены * |
List of strong thesis statements
List of strong thesis statements, Thesis statements what is a thesis strong thesis usually addresses a potential opposing viewpoint the list thesis.
Whether you’re writing an argumentative, informative, or a comparative paper, we have some tips for you on how to write a strong thesis statement. 1 write a strong thesis statement what is a thesis statement it is usually a single sentence at the end of your first paragraph that presents your. How to write an argumentative thesis statement every reader would not agree with it and there is a chance for the writer to support his statement with strong. Writing a strong thesis statement in your academic essay creating a strong thesis statement is essential for writing any a-worthy paper the strength of your. A strong thesis statement gives direction to the paper and limits what you need to write about gustavus adolphus college 800 west college avenue saint peter.
Developing a strong thesis statement view worksheet with a narrowed-down topic, you are ready to develop your thesis statement this statement conveys the topic of. Use this thesis statement generator to build your argumentative or compare and contrast thesis statement in less than 5 minutes. Looking for some free examples of thesis statements this article contains compares several good and bad examples, as well as a checklist of traps that writers might. Thesis characteristics put the thesis as a statement make sure your thesis is in the form of a statement, not a question can we save the amazon rain forest.
How can the answer be improved. A strong thesis statement is a critical element of almost any academic paper, summarizing what the paper is about, offering a clear point of view and providing. Common problems first, look through this list of common mistakes made when writing thesis statements to summarise, the major errors tend to be that:.
How to make a strong thesis statement let’s have brief information about thesis statement and it’s significance in writing an essay or thesis. Thesis statement can be-apart of a longer introduction paragraph or it can stand alone-one sentence or multiple sentences thesis statement must. Strong thesis example - step 1: narrow down your claim the major problem with a thesis statement is that at times they tend to be too wide and fail to make a claim.
Notice that the last two, #4 and #5, are not necessarily incorrect or illegitimate thesis statements, but, rather, inappropriate for the purposes of this course they may be useful forms for papers on different topics in other courses 1 the non-thesis thesis a thesis takes a position on an issue it is different from a topic sentence in that a thesis. Weak thesis type 2: the thesis is obviously true or is a statement of fact problem examples the jeans industry targets its advertisements to appeal to young adults. Now that we know what a strong thesis statement is, we can begin to craft one of our own most effective thesis statements often answer these three questions. It looks like any 4 of those statements can make the beginning of a strong thesis statement 1) the welfare of the individual is more important than the welfare of the group because reason 1, reason 2, reason 3.
List of strong thesis statements
Rated 5/5 based on 22 review |
~ Auto Buzz ~: Science Explains Why It’s Best to Drink From A Copper Cup
Saturday, 15 September 2018
Science Explains Why It’s Best to Drink From A Copper Cup
Drinking out of a copper cup might seem a little weird, but doing so will provide important health benefits for your body. Water gets a positive charge from copper, and when copper leeches into water, it adds antimicrobial, anti-inflammatory, anticancer, and antioxidant properties. The study that revealed this information also found that storing contaminated water in a copper cup for 16 hours dramatically reduced the amount of harmful microbes in the water.
People in developing countries could have access to clean drinking water if they use copper cups to store their water. This study is truly groundbreaking and could change millions of people’s lives.
In addition to providing clean drinking water, copper can eliminate infection risk in hospitals. In preliminary results of a multi-site clinical trial in the United States, researchers found that copper surfaces in hospitals killed 97% of harmful bacteria that can result in infection. Just because of the copper surfaces alone, the study showed a 40% decrease in infection risk.
Now that you know the power behind copper, we will go over a few important benefits of drinking water out of a copper cup. Even if you don’t live in a developing country or frequently visit the hospital, a copper cup can be a positive addition in your life.
Here are some benefits of drinking from a copper cup:
“If you hold water in a copper bowl, preferably overnight or for at least four hours, the water takes certain qualities from the copper that are primarily good for your liver, but also for your health and energy in general.” – Sadhguru, Indian yogi, mystic, and philanthropist
1. It improves the digestive system.
For the best results, drink water from a copper cup when you first get up in the morning. Drinking water when you wake up stimulates the digestive system and helps eliminate toxins. When you drink from a copper cup, it stimulates something called peristalsis, or the contraction and relaxation of the stomach, which helps your body digest food. During detoxification, your body will eliminate harmful bacteria and reduce inflammation, which will improve your digestive functioning. If you have digestive issues, drinking from a copper cup could prove instrumental in your recovery.
2. A copper cup helps boost your immune system.
Because of the antioxidants present in copper, drinking water from a copper cup regularly can strengthen your immunity. Copper aids in different enzymatic processes that promote endothelial growth, or tissue healing. Because copper helps eliminate harmful bacteria, it can help give your immune system a boost and keep you healthy.
3. It helps you lose weight.
Copper can play an important role in your weight loss by helping to heal the thyroid gland and break down body fat. Copper actually helps with the synthesis of an important coenzyme in the body called adenosine triphosphate, or ATP. Otherwise known as the “molecular unit of currency,” it basically helps give the body energy. Therefore, when you drink water from a copper cup, you will have more energy, which can aid in weight loss.
4. Copper cups can ward off cancer.
Drinking from a copper cup can help fight cancer because of the antioxidants present in copper. Antioxidants help fight off free radicals, which allows oxygen to move through the cells, therefore warding off cancer. While there aren’t many studies available regarding copper’s use for cancer, it holds a lot of promise for the future of cancer treatment.
copper cup
5. It stimulates your brain.
Copper aids in the synthesis of phospholipids, which helps to form myelin sheaths over neurons in the brain. These sheaths allow the impulses to move from one neuron to another in the brain, and the faster these impulses move, the more efficiently your brain can function. The better your brain functions, the more you can engage in positive thinking which will only increase the benefits of drinking from the copper cup. Drinking from a copper cup can also help prevent seizures and other brain-related ailments.
Other notable health benefits include: healing wounds quicker, slowing down aging, maintaining cardiovascular health and lowering blood pressure, reducing or eliminating arthritis and inflamed joints, warding off anemia, aiding in melanin production and promoting healthy skin.
Final thoughts
If you don’t already drink water out of a copper cup, you should definitely start due to all the health benefits you will receive. It might seem strange at first, but once you notice how great you feel, it will become second nature. You can look on popular sites such as Amazon or Ebay for a quality copper cup.
(C)Power of Positivity, LLC. All rights reserved
The post Science Explains Why It’s Best to Drink From A Copper Cup appeared first on Power of Positivity: Positive Thinking & Attitude.
Share This: |
Pain in the upper right chest is usually not an indication of a cardiac event but more likely the result of a pulled rib muscle, gallbladder problems or liver inflammation. When the pain is felt only on the right or left side of the chest and not in the center of the chest, it is not likely to be cardiac ischemia, according to If a patient is capable of pointing his finger at one specific area of pain, that is an indication that the cause is not cardiac ischemia. However, if you are experiencing any type of chest pain, you should contact your physician.
One cause of right upper chest pain is rib subluxation, according to Subluxation of the rib means that one or more of the ribs have been slightly displaced, which causes pain. The pain may come from your back around to the front and can get worse when you are breathing deeply. If you lean over, the pain will get worse. Usually this condition will resolve itself in a week or two.
Inflammation of the liver or hepatitis can result in right-side chest pain. Hepatitis attacks the liver. Right-side chest pain can also be indication of a problem with your pancreas or gall bladder. Both the gall bladder and pancreas are situated in the upper abdomen. When either organ becomes inflamed, this can cause pain that radiates from the front of your chest around to your back.
When bile and cholesterol crystallize in your gallbladder, gallstones can form. When you have gallstones, the pain will ascend to your chest. This pain can be severe. If you already have heart problems, gallstones can prompt chest pains.
Features explains that gallbladder problems can create a feeling of pain and fullness under your breastbone or in the upper right side of your abdomen, which is right underneath your right chest area.
Right-side chest pain can be caused by costochondritis, which impacts the sternum between the chest bone and the ribs. Costochondritis is one of the outcomes of a condition called fibromyalgia. If you have costochondritis, you will be able to feel pain when you move your upper torso or when you make contact with your ribs. The pain is usually felt in the left side, but it can occur on the right side or both sides.
About the Author
Photo Credits
• Jupiterimages/ Images |
Italian Chapel
When 550 Italian soldiers were captured in the scorching North African desert back in 1942, it must have caused them quite a shock to be sent in winter to the Scottish isle of Orkne. The POWs were sent here in order to build the “Churchill Barriers,” a series of causeways that would protect the British Grand Fleet in the Scapa Flow harbor. By 1943, the homesick workers requested a chapel where they could worship. What did they get? Two Nissen huts, which they were told to join end-to-end and labor over outside work hours.
What happened next is a beautiful symbol of peace, faith and the power of human ingenuity even in wartime. Local Orkney artists provided brushes and poster paints to decorate the huts; bully beef tins were converted into makeshift candle holders; wood scavenged from shipwrecks was used to create furniture; a car exhaust was covered in concrete to create a Baptismal font. Slowly but surely, those two steel sheds became the Roman Catholic chapel of the Italians’ dreams.
The main man behind the chapel’s decoration was POW Domenico Chiocchetti, who painted a false frontage so that it really looked like the Roman Catholic churches of home. He was so dedicated to the project that when everyone was sent home in 1944, he stayed on to finish the project.
In 1960, Chiocchetti returned to Orkney from his home in Moena, Italy, to assist with a restoration projection of the chapel. When he left three weeks later, he wrote a letter to the people of Orkney: "The chapel is yours, for you to love and preserve. I take with me to Italy the remembrance of your kindness and wonderful hospitality.”
Practical Info
Cared for by local volunteers, entry to the Italian Chapel is free. From Orkney’s main town of Kirkwall, the church is an eight-mile drive south.
住所: Lamb Holm, Orkney, Scotland, スコットランド
+81 6 4560 2975 |
Lock up your satellites and batten down your power-lines because a Coronal Mass Ejection (CME) is headed our way. According to the National Weather Service's Space Weather Prediction Center (SWPC), it is the strongest Solar Radiation Storm since May, 2005. According to NASA, the CME is moving at almost 1,400 miles per second (2,253 km/s) and will reach the Earth's magnetosphere as early as 9 a.m. US EST on Tuesday, January 24 - give or take seven hours.
NASA says the radiation storm, which is ranked as an S3 (strong) event, is the result of an M8.7 class solar flare that erupted late on January 22, sending a CME and a burst of fast moving, highly energetic protons known as a "solar energetic particle" event towards the Earth. With the arrival of the CME, the SWPC forecasts G2 (Moderate) level geomagnetic storming, with G3 (Strong) levels possible. It expects the "enhanced conditions" to last through Wednesday.
The burst of solar wind has the potential to cause isolated reboots of computers on board satellites, damage power lines, and disrupt radio transmissions. It can also expose those in space or at high altitudes - in an airplane, for example - to intense radiation. There have already been reports of flights over the North Pole being rerouted and no launches into space are expected for the duration of the event for this reason.
On the upside, the collision of the energetic charged particles with atoms in the thermosphere is likely to result in quite the light show with particularly strong aurorae around the Arctic Circle likely.
Sources: SWPC, NASA
View gallery - 3 images |
Climbing the Cognitive Learning Ladder
Using Dr. Benjamin Bloom's principles of learning can make your safety training much more effective.
The general consensus of those responsible for on-the-job safety is that unsafe acts cause most all on-the-job injuries. The safety field recognizes that companies with world-class safety have a certain culture in which people do not engage in the unsafe acts that result in an actual loss. Because most injuries result from human actions, the key battle in the safety war is for the minds of the workers. Training is a major part of many safety professionals' job responsibilities and an important tool in changing the minds, and subsequently the behaviors, of the workforce. Because this training is a vital part of the communication process to change the behavior of the workers, it is safe to say a professional responsible for safety must have every bit as much understanding of how adults learn as he or she does about the technical aspects of safety in order to maximize the training provided to the workforce.
All of the technical knowledge in the world is for naught unless we can communicate with the workforce and get the workers, as well as management, to truly value safety. Unfortunately, too many risk and safety professionals, while well trained in the technical aspects of safety, are not prepared to provide not just training, but optimized training. Fortunately, there are learning theorists who understand how to relate this information to those with a limited preparation in adult learning theory. One of those theorists is Dr. Benjamin Bloom. "Bloom's Taxonomy" can be a valuable tool in helping to understand how adults learn in order to optimize your training program.
Too often, people responsible for training have no background in how adults learn. An ironic but good example is at the college and university level, where the faculty members usually have earned a Ph.D. The Ph.D. is primarily a research degree, as opposed to the Ed.D. (Doctor of Education), that has much less emphasis on research but deals with teaching and learning. College faculty members often are sitting in the class one day and standing in front of the class the next. While they might be an expert in the technical aspects of their chosen fields, many are not prepared to relate that knowledge to others. Anyone who has been a college student for long has had him or her — that brilliant teacher who is a master of his/her discipline but just can't relate it to students. This example serves to demonstrate just how widespread the problem of poor teaching is, even at the university level. U.S. Supreme Court Justice Potter Stewart said in a 1964 decision he did not know how to define pornography but would "know it when I see it." (Jacobellis v. Ohio, 378 U.S. 184) Unfortunately, many trainers are the same way, not knowing what makes up good training and, although they know it when they see it, not understanding how to get there when they are responsible for the instruction. People too often assume teaching is just talking and cannot be too difficult. Unfortunately, this is much like people who believe safety is not a real discipline because, after all, safety is just "common sense." Maybe teaching is just talking, but effective teaching is something of an art, just like the practice of safety.
One of the key theories of adult learning is attributed to Dr. Bloom (1956). He developed a framework of understanding for adult learning known as Bloom's Taxonomy. Understanding this taxonomy will help risk and safety professionals who train understand how adults learn and, as a result, better understand how to become effective teachers.
Bloom explains learning as falling into three different domains. One type is psychomotor learning. This type of learning is action and motion. An early example of this type of learning is found in kindergarten, when children walk across a balancing beam on the fl oor to help them develop their coordination. Another example is having children crawl on the fl oor under a canopy to simulate the smoke in a fire. An adult example could be in emergency response training, where workers are trained to don protective gear when an alarm goes off. The concept of seeing an action, practicing an action, and then doing the action under the watchful eye of the instructor is an important part of psychomotor learning.
Another type of learning is affective. Affective learning involves the values and attitudes of workers. A childhood example could include how, in the early grades, the teacher works with the children about being respectful of others and not interrupting people. An excellent adult safety example is how, in a company with an advanced safety environment, the workers not only wear PPE on the job — they also wear it off the job. It is an ironic tribute of safety's effectiveness in a company where the concern goes from working to get workers to wear PPE on the job to having the workers take PPE off the job for home use.
The third domain of learning in Bloom's Taxonomy is cognitive learning. This type of learning involves facts, rules, principles, and procedures. Cognitive learning occurs in the elementary school classroom, as well as in the college classroom. It also occurs on the job. Cognitive learning is broken into six progressive steps. As the learning progresses up the ladder, a higher level of learning occurs. As we will see, the purpose of your training should be to get the learning to move as high as possible up the ladder in order to maximize the training and, hence, the safety effectiveness.
Levels of Cognitive Learning
The first level in Bloom's cognitive learning is "knowledge." This is the most basic level and involves simply knowing. Knowing how to put on a lockout/tagout device, an SCBA, or label a chemical container to comply with the HazCom standard are several examples. Knowledge is very basic and requires that the worker see a task, practice the task, and then do the task with the help of the trainer. It is here that most training programs fail, because many managers and trainers don't understand that people have free will. Simply put, just telling workers and giving them knowledge is almost certainly bound for mediocrity, if not outright failure.
Another adult learning theorist, Dr. Malcolm Knowles, indicated good training for adults requires that the learner not only know what, but why. Think about it: Do you as an individual do better when you simply know what, or do you understand better and have more buy-in when you know why? Children in the early childhood grades can be simply taught what and, because of their respect for the authority of adults, will comply with "what." However, as the individuals get older — the parents of children who reach the "tween" and preadolescent years will attest — they want to know why. While frustrating for parents, it is the natural progression from child to adult psychology. The child turning adult wants to know why they have to do something and why it is worth their time.
Does your company's training system treat your workers as children, expecting them to simply do as they are told and to essentially "shut up" about it? Then, at the same time, does your company expect the same person to exercise judgment as an adult when it suits the company? While a "tween" will openly defy this type of learning, the adult learners have figured out such open rebellion will lead to negative job consequences, so they simply do what they are told, but only as long as someone is watching. The company that takes the position of expecting to teach adults like children and then act like adults when the time comes to exercise independent authority on the job is completely ignoring human nature, and doing so at its own peril.
Comprehension. At the very least, adult learning needs to move to "comprehension," Bloom's second level of cognitive learning. Keeping in mind the theories of Malcolm Knowles, as well as the simple logic that adults should understand why they are doing something, this is the very minimum level your training program should progress the worker to regarding cognitive learning. Still, this level of learning, simply knowing "what" and "why," will produce mediocre results. That is because, in our complex world, workers often have to make independent decisions and exercise judgment.
Application. The next level is "application." Better than just doing a task (knowledge) and understanding why (comprehension), application requires that the learner be able to apply the knowledge in different situations. While knowledge requires the learner to see a task done, practice the task, and then perform a task, application of learning requires the learner to apply the knowledge in circumstances that might be different from how the task was learned. A very simple example average workers can understand is egress. This sequence is when a worker is taught to exit a specific door during an emergency (knowledge) and knows he could die if he fails to exit when the alarm is sounded (comprehension), application requires the worker, without further instruction, to go to another door should the first door be locked. Egress is a simple application, but it is the application step that separates poor and average training programs from excellent ones. Certainly, the "average" worker will have the "common sense" to egress to another exit, should the first be blocked. However, will the "average" worker know what to do in a more complex scenario, such as going into a potentially dangerous confined space that can host a multitude of different hazards?
Analysis. The next step in the cognitive learning process is "analysis," which is where the learner can separate one part of the system from another in order to see patterns and diagnose potential problems. For example, a maintenance worker is trained in locking out a machine (knowledge) and knows that failing to lock out the system could result in someone turning on the machine, catching him inside (comprehension). The worker's lock key is lost, so the worker gets another (application). However, analysis requires the worker to go a step further and see patterns. When the worker analyzes the situation, he realizes another lock might not be secure, meaning there could be another key, which could result in the lock's being taken off and, although he locked the system out, someone could still be at risk. While a worker with "knowledge" doesn't know, a worker with "comprehension" does, but only about his own specific situation, not the situation as a whole. A worker with "application" doesn't know about the situation as a whole, while the worker with "analysis" comprehension will see the whole risk picture. It is at this point that the worker can start to act like an adult in regard to safety; he doesn't need a safety professional or a manager to baby-sit him on a minute-by-minute basis, but can start taking some active, decision-making responsibility for his own safety. The worker still needs safety professionals to help with more advanced risk analysis and keeping abreast of the latest information in accident causation and prevention, as well as occupational health development.
Synthesis. The fifth step in the process is synthesis. At this level, the worker is able to break down a system into individual parts and reconstruct the system to form a better system. It is at this level where workers can be invaluable in helping to develop the safety system. For example, it is safe to say the average safety professional does not have the knowledge of electricity that the average union electrician has. The electrician has the electrical knowledge while possibly lacking the safety knowledge to make the system he/she works in safer. The safety professional has general safety knowledge but lacks the information about the technical aspects, as well as the day-to-day operational aspects of the electrician's job. However, when you put the skills of the electrician and safety or human resources professional together, when they can communicate with each other, a great synergy occurs where the sum of the parts is greater than the individual parts themselves. When this occurs, the safety program moves into an advanced level as the HR or full-time safety professional is able to deal with safety problems that he/she would have never known about, absent the input from a trained electrician. However, it is the job of the manager, not the electrician, to make this happen by communicating in the electrician's language.
Evaluation. The final step in Bloom's Taxonomy is evaluation. When the worker reaches this threshold, he/she is able to judge the effectiveness of programs in an everyday environment, including emergencies. When the worker reaches this level, he/she is able to be a great resource for the safety or HR professional, who can use the worker as a brainstorming partner to see how one safety program might interact with another. The confl ict between closing doors for building security and opening them for egress serves as a good example.
Achieving World-Class Culture
The value to your safety program in Bloom's Taxonomy of the cognitive domain is better understood when merged with an understanding of Bloom's views of the affective domain, which affects values. There are four levels of the affective domain. The first is "awareness." At this stage, the worker simply knows of a value or an action, such as working safely, but doesn't necessarily follow it. Contrast this with the next phase, which is "reinforcement." In this phase, the worker knows of a value or action but follows it only when there are positive reinforcements, such as a safety incentive program, or negative reinforcement mechanisms, such as being written up or fired for safety violations. It is because of these reinforcements that the worker acts in the way he/ she does, not because he/she believes in safety as a core value.
It is at the third phase, "promotion," that the safety program begins to take off. At the promotion phase, the worker believes in safety, follows safety procedures without reinforcements, and encourages others to do the same. Before this phase can occur, the worker must value safety. Before the worker can value safety, the worker must understand why. As discussed earlier, this understanding that leads to valuing does not occur in the lower phases of Bloom's Taxonomy (knowledge and comprehension) as it relates to cognitive learning.
The final phase is "defense," where the worker believes in safety so strongly, he not only will act safely without any external motivators or punishments and not only will encourage others to follow safety procedures, but also will actively defend the general concept of safety or a specific safety program or procedure in the face of criticism. Safety and risk professionals should be at the "defense" phase in their daily lives.
The problem regarding the workforce's posture of the "affective" domain within Bloom's Taxonomy comes in that many, if not most, workers and managers are at the lower two phases: They don't value safety and follow safety procedures only when they are forced by negative consequences or encouraged by positive rewards. The result is that the risk and safety professional is a safety cop, not a professional who is valued and sought out.
A perfect example of the two parts of Bloom's Taxonomy, cognitive and affective, is an experienced safety professional, risk professional, or HR professional with a solid background in safety. Off the job, do you wear PPE when doing work around the house — not because of negative or positive reinforcement from an outside force but because you truly value safety? Do you buckle up because you are afraid of the traffic officer or because you know good and well what will happen to you if you are involved with an auto loss and are not buckled up? Do you keep a fire extinguisher handy and the batteries in the smoke detector fresh? Do you teach your children these things and encourage your spouse and extended family to do the same? If so, why?
Dr. Bloom didn't claim to know anything about safety. However, his insights into adult learning, the way we learn, and the way we come to value something such as safety are too important a lesson to ignore as we strive to make the workplace a safer place.
Download Center
HTML - No Current Item Deck
• Free Safety Management Software Demo
• Easy to Use Safety Incident App
• Safety Training 101
• Conduct EHS Inspections and Audits
• Track Key Safety Performance Indicators
• Industry Safe
comments powered by Disqus |
Posts Tagged ‘Apartheid’
Some disturbing news has recently surfaced around one of South Africa’s eight Heritage Sites, The Mapungubwe Cultural Landscape which lies on the open savannah of the Mapungubwe National Park.
The South African Department of Mineral Resources has awarded an Australian mining company called Coal of Africa (CoAL) unconditional new order mining rights for the Mapungubwe area.
A stakeholder group consisting of the Endangered Wildlife Trust, the Mapungubwe Action Group, the Office of the International Coordinator for the Greater Mapungubwe Trans-frontier Conservation Area (GMTFCA), the Endangered Wildlife Trust, the Association of Southern African Professional Archaeologists, World Wide Fund for Nature South Africa, BirdLife South Africa, the Wilderness Foundation South Africa and Peace Parks Foundation objects to all industrial activity in that part of the very sensitive Limpopo Valley without an approved Integrated Regional Development Plan. No replies by the relevant authorities have been received thus far.
Even before having obtained the necessary water license or any other kind of environmental approval, large-scale destruction is already underway on the bank of the Limpopo River, just a kilometre or two from Mapungubwe. CoAl has already cleared many hectares of indigenous forest in order to start building its controversial Vele coal mine on the bank of the Limpopo River.
Mapungubwe's famous gold-foil rhinoceros
Mapungubwe was home to an advanced culture of people. The civilization thrived as a sophisticated trading center from around 1200 to 1300 AD. It was the center of the largest kingdom in the sub-continent, where a highly sophisticated people traded gold and ivory with China, India, Persia and Egypt. According to the archaeology department at the University of the Witwatersrand, Mapungubwe represents “the most complex (historical) society in southern Africa”.
Gold was mined in haematite at Ngwenya, and iron ore and copper at Phalaborwa. Virtually all the copper and tin deposits of the Northern Transvaal were worked, and hundreds of workings remain.
Although the University of Pretoria excavated the site when it was discovered in 1932 it was kept top secret. The findings provided evidence contrary to the racist ideology of black inferiority that underpinned apartheid. The apartheid regime remained tight lipped for more than 40 years. The evidence was only made public a few years after the first democratically elected government came into power in 1994.
Additional gold artifacts found at Mapungubwe
The mine has the potential to bring all this to an end, threatening the World Heritage Site, the transfrontier conservation area and the tremendous tourism potential.
To add insult to injury, the Order of Mapungubwe is South Africa’s highest honor that can only be granted by the president of South Africa, for achievements in the international arena, which have served South Africa’s interests. How can this honor maintain its prestige when the government that claims to hold it in high esteem is systematically destroying that proud heritage?
Kevin Carter
On the 24th of July 1994 South Africa lost one of its greatest photographers, his name was Kevin Carter. He died under suspicious circumstances with his death being reported as a suicide. Carter was born in 1960, the year of the banning of the ANC, into a Catholic family that accepted Apartheid. He, like many of his generation questioned the regime and saw the inherent injustice that the Apartheid system carried; he would often have serious quarrels with his father about it.
He was conscripted into the South African Defense Force (SADF) as was normal for any young white male at the time that was not disabled or could not obtain a student deferment. He loathed upholding the Apartheid regime and was once severely beaten and called kaffir-boetie (“nigger lover”) by some of his comrades in the SADF for trying to take sides with a black mess-hall waiter.
After completing his military service he got a job at a camera supply store and this is where his journey began. He made his name as an upcoming photographer with the local newspapers. By the year 1984 riots began sweeping the black townships and Carter aligned himself with other young photojournalists who sought to expose the brutal regime. He was the first to photograph a public execution by the cruel method of “necklacing” where a tyre is put around the victim, doused with petrol and set alight. This was a common execution specifically for individuals identified as working for the oppressive state as informants.
He also captured images from the unsuccessful invasion of Bophuthatswana by white right-wing outlaws. Their intentions were to give support to the setting up of a black homeland which was part of Apartheid’s separate development policy. These images were quite jarring as they graphically displayed the dead bodies of the right-wingers after having been executed by black Bophuthatswana policemen.
This blatant exposure of the ills of the Apartheid state was reaching far and wide and increasing the calls that would rally the world against the immoralities of the regime. One begins to foresee the kind of attacks that would most likely arise from the tyrannical state known for having units of assassins and unscrupulously eliminating any opposition. Knowing the background of the government would surely lead one to worry for the safety of Carter.
On April the 12th, three months before his death, the New York Times called him and notified him that he had just won the most coveted prize for a photographer, the Pulitzer Prize. The prize was awarded for an eerie picture he shot in famine-stricken Sudan which depicted a gravely malnourished child being watched by a vulture waiting in anticipation for the child’s death. He was jetted to Manhattan, New York where he was celebrated and he wined and dined with the top echelon of the photographing industry.
Two months later he was back in South Africa. He did little work in this period. During a lunch with a colleague he mentioned that he was thinking of forming a writer-photographer free-lance team and traveling Africa. This clearly shows that he was harboring ideas for the furthering of his career. It is therefore strange that barely a month later he was found dead in what looked like a death by suicide.
The Pulitzer Prize gave him a much greater status and only served to popularize his pictures that visually divulged the usually state-censored inner workings of the Apartheid regime to the world. The prize also meant that he would not find difficulty in finding work as a photographer and was an omen of good luck for his future. Why then would this gifted, budding photographer take his own life? The absence of evidence pointing to murder leaves a shadowy cloud around the circumstances of his death. At the end only he would know the events which would lead to his ultimate demise.
President Jacob Zuma
Eugene Terreblanche
Last month Secret South Africa posted a blog about the case of the Lockerbie Bombing in 1988. The incident resulted in the death of 270 people. One of those people was Bernt Carlsson from Sweden, the UN High Commissioner in Namibia. Foul play was suspected especially because of the animosity between Carlsson and the Apartheid government. Shockingly, two years earlier another important dignitary who was a close colleague of Carlsson and arguably of a much higher profile was murdered.
Olof Palme in the early 70's
Sven Olof Joachim Palme was the leader of the Swedish Social Democratic Party from 1969 until his assassination in February 1986. Informally known as Olof Palme, he initially rose to the position of Prime Minister of Sweden in 1969 and remained in that position until 1976. He was re-elected in 1982 and remained in that position until 1986 when he was brutally gunned down. Bernt Carlsson was one of his protégés and political allies. Olof Palme was known to polarize people’s political views, finding himself profoundly supported by those on the left and equally abhorred by those on the right. His policies made him a widely recognized international political figure because of the controversial positions he stood by.
The fateful night of his murder, Olof Palme had decided to go and watch an evening movie at the cinema with his wife Lisbet Palme. He was known for trying to live a life as ordinary as possible often going places without any protection from his bodyguards. This night was one of such nights. While walking home from the cinema on a central street in Stockholm the couple was attacked by a lone gunman. The Prime Minister took a fatal shot at close range to the back. His wife was hit by a second shot and was wounded. Despite being rushed to hospital Olof Palme was pronounced dead on arrival. Nobody was ever convicted of the assassination but when one looks at Palme’s history strong suspicions begin to get raised in the direction of Apartheid South Africa.
Born in 1927 he went on to become President of the Swedish National Union of Students while studying law at Stockholm University at the age of 25. From early on in his academic life his political stance leaned toward socialism. Later on in life he often attributed this stance to the time he spent studying towards a Bachelor of Arts degree in the United States (1947-1948) where he became very aware of the divisions of class and was incensed by the role racism played in the society.
The institutionalization of racism in South Africa was yet to become a major issue in international politics but Palme’s strong adverse opinions to the racist doctrine, from early on, already positioned him as a potential enemy to the apartheid state. It is also crucial to note that the South African government was to become the major opposition to the spread of communism and socialism in Southern Africa, funding several proxy wars in order to maintain ascendancy in the region and protect their unjust regime. Palme’s socialist stance would come to position him against the regime.
Apartheid South Africa’s aims at growing their nuclear weapon arsenal was something well known in the world arena at the time. One can only imagine the stir that Palme created amongst the South African government of the time with his continuous campaign against the proliferation of nuclear weapons. The gravity of this campaign in terms of its direct approach to dealing with imperialism pales in comparison with his outright and very vocal opposition to apartheid on the world stage. This opposition manifested in his stubborn support for economic sanctions against Apartheid South Africa. His support for the struggle of the people in South Africa also extended as far as both political and financial support for the leading organization opposing Apartheid, the African National Congress (ANC).
On the 21st of February, a week before he was assassinated, Palme made the keynote address to the Swedish People’s Parliament Against Apartheid which was held in Stockholm. The event was attended by thousands of anti-apartheid sympathizers, leaders and officials from the Anti-Apartheid Movement as well as from the ANC. Oliver Tambo, President of the ANC, was amongst those of the most prominent leaders that attended the event. In Palme’s address he made one his most remembered statements, “Apartheid cannot be reformed, it must be eliminated”. This statement made him a direct threat to the immoral leaders of the vampiric apartheid state.
Eugene de Kock
The ANC was reviled by the apartheid state, so much so that the state actually had units of assassins whose mandate was to target key figures in the organization and other figures outside it who were seen to be supporting it in any way. No clear evidence for Palme’s killing was ever found that could conclusively point the finger at the apartheid government. However, ten years after Palme’s assassination, Colonel Eugene de Kock, a former South African police officer and covert assassin alleged that Palme had indeed been killed by the apartheid government. The reasons cited were his strong opposition to the apartheid government and Sweden’s financial and political support of the ANC.
De Kock named Craig Williamson who was a former police colleague of his and a South African superspy. Swedish police investigators visited South Africa a month later to try and find evidence to substantiate the claim but were unsuccessful. In a September, 2010 interview, Tommy Lindstrom, head of the Swedish Crime Investigation Department (CID) during the 80’s was asked who he thought was responsible for the assassination. He responded without hesitation that he still suspected apartheid South Africa were behind the assassination.
Several of the names that came up in the Lockerbie article popped up again in this one, is this a concidence? Why would Eugene de Kock deliberately lie about the killing of Olof Palme? De Kock had nothing to lose or gain by claiming responsibility for the murder. Sweden and Palme particularly, were clearly throwing as much weight as they possibly could to put pressure on the apartheid government. Knowing the violent nature of the oppressive state it certainly would not be a surprise to find confirmation of their role in the assassination. Finally, the lack of hesitation of Sweden’s highest rank of detective at the time to point the blame to the apartheid government certainly seems convincing. We leave it up to you decide…
Bernt Carlsson
Oliver Tambo
Pik Botha
Magnus Malan
Through Project Coast, the Apartheid Government developed a range of biological and chemical weapons that were used to eliminate political rivals. The following article deals with one of the Apartheid Government’s preferred assassination methods: lacing items of clothing with poison.
There have been a variety of documented reports, detailing how Apartheid agents laced items of clothing with lethal toxins and poison, so that they would be slowly absorbed by their victims and cause death without suspicion of foul play.
In an article published by the Daily Mail in 2007, shocking details were finally put on record when Adriaan Vlok, the hardline Apartheid-era police minister, admitted to trying to kill Frank Chikane, a black anti-apartheid activist by lacing his underwear with poison. Vlok was the only apartheid-era minister to appear before the Truth and Reconciliation Commission. And while he received an amnesty for a series of bombings that he orchestrated during Apartheid, he faced criminal chargesfor his assassination attempt on Chikane’s life.
Frank Chikane, who survived the attack, went on to play an important role in South Africa’s new government, becoming advisor to former President Thabo Mbeki. Chikane testified that the specific type of poison used against him attacked his nervous system, making him violently ill.
Unfortunately the use of poisoned items of clothing was not an isolated incident during Apartheid. According to other reports, the Roodeplaat Research Laboratories developed a poison that could be applied to T-shirts. As the toxin entered the bloodstream, it would form a blood clot causing heart failure. An autopsy would thus show the cause of death to be natural. This plan was part of an attempt to target black student activists, but ultimately failed when the police hit squads who were to distribute the T-shirts “chickened out.”
How many people were killed by the Apartheid Government through this insidious and cowardly tactic? What other dirty tricks did the Apartheid Government have up their sleeves? The further I dig back into the past, the stronger I believe that the truth is stranger than fiction.
When you think of nuclear weapons, you probably think of America, Russia, China or Iran. But you might be shocked to discover that South Africa had its very own secret nuclear programme that was developed during apartheid.
While sources disagree about the exact date that the Apartheid Government initiated their nuclear arms programme, many believe that the decision “develop a limited nuclear deterrent capabilities” can be traced back to as as early as 1974.
In order to achieve this goal, the government stepped up the production at their uranium enrichment plant at Valindaba, known as the “Y-plant”. Numerous nuclear tests were also performed at the Somerset West explosives installation near Cape Town.
While the Apartheid Government’s activities during the 70’s were mainly secret, their actions did alarm leaders in the Soviet Union and the U.S. The Soviets allegedly considered a pre-emptive strike on the Y-plant, an option that U.S. officials reportedly rejected.
In 1977, South Africa successfully managed first full-scale nuclear explosive device based on a gun-type design.
According to reports, a U.S. Vela surveillance satellite detected a distinct light event off of Africa’s southern coast in 1979. U.S. officials believed that the source of the light was a nuclear test performed by the Apartheid Government, producing an intense double flash of light. The Apartheid Government denied all knowledge of the event. Later, representatives from the government stated that South Africa could not have been responsible for the double flash as it did not possess a complete nuclear device until November 1979.
According to reports, the Apartheid Government managed to produce a total of six nuclear devices by the 1980’s. The Apartheid Government was able to do so by mastering the uranium production and enrichment process in order to develop a complete nuclear fuel cycle with advanced waste management techniques.
But while South Africa was able to produce a number of nuclear weapons, by the late 1980’s, the Apartheid Government was facing incredible political pressure, both locally and abroad.
One of the government’s strongest bargaining chips was the ability to negotiate with regards to their nuclear weapons programme. Under great international pressure, South Africa begun nuclear disarmament in 1989.
What happened to all of South Africa’s nuclear scientists? Where did they go and what have they been doing for the past twenty years? Some might be driven by money, some by ideology…but it’s hard to imagine that they have been sitting around twiddling their thumbs…There must be plenty of rouge nations or extremist groups that would the skills that only nuclear scientists could provide. Could nuclear experiments still be secretly going on in South Africa?
What do you think?
For a more detailed overview of South Africa’s secret nuclear history, click here
For more information about the South Africa’s disarmament process, click here
The following post contains information from The South African Chemical and Biological Warefare Program: An Overview, by Chandré Gould and Peter I. Folb.
While many details about Project Coast have not been made publicly available, one particular covert operation that has been partially documented is Operation Barnacle.
Operation Barnacle was established in the early 1980’s and involved members of the South African Defence Force and former Rhodesian security forces. The primary goal of Operation Barnacle was to eliminate the enemies of the Apartheid Government.
A number of these covert assassinations were carried out by utilising a variety of toxins and chemicals developed by Wouter Basson and other Apartheid scientists.
The majority of victims targeted by Operation Barnacle were members of the South West African People’s Organization (SWAPO) in Namibia. It is estimated that the number of deaths of prisoners of war and those who were considered “security risks” were well into the hundreds.
Johan Theron, who testified at Wouter Basson’s criminal trial, said that he was ordered to inject his victims with overdoses of muscle relaxants tuberine and scoline. This caused death by suffocation. All bodies were disposed of by throwing them out of aircraft into the sea.
Other victims of Operation Barnacle included members of the ANC, members of the United Democratic Front, individuals in the South African Council of Churches and its associated organizations and even members of the SADF who threatened to reveal the workings of the Apartheid Government.
Operation Barnacle was just one of the many covert operations initiated by the Apartheid Government under Project Coast. But how many similar operations were there? How many deaths were the Apartheid Government responsible for? And what other atrocities did they commit.
We might never know.
The South African Police are on the hunt for Joe Mamasela, a former Vlakplaas death squad member and self-confessed killer of anti-apartheid activists. According to reports ( Mamasela is being sought for the murder of his landlord.
Mamasela allegedly gunned down Joseph Nhlapo, on Saturday, after an argument with him about an eviction notice.
Mamasela confessed to the assassination of Port Elizabeth’s Pebco3 – Sipho Hashe, Qaqawuli Godolozi and Champion Galela but was granted indemnity from prosecution after helping to track down former security policemen involved in assassinations in the apartheid era.
Police are still searching for Mamasela but have warned the public that he is considered armed and dangerous.
Isn’t it weird that we have numerous former Apartheid assassins and soldiers within our society?
I wonder how many we have… |
With the recent online trend of the ALS “Ice Bucket Challenge” and this Saturday’s Fredericksburg Walk to End Alzheimer’s event, many people have been flooded with requests for charitable donations. Most people are willing to donate to a charitable organization without any questions asked. However, very few realize the actual legal implications of their donations, as well as the charitable organization’s corporate structure and regulations.
Most people tend to think of charitable organizations as a non-profit organization or public charity, such as American Red Cross, Smithsonian Institute, Alzheimer’s Association, etc. In order to become a non-profit organization, these businesses must be structured under specific regulations by the Internal Revenue Service (IRS). The IRS has specifically outlined these regulations in 26 U.S. Code 501(c)(3). Section 501(c)(3) is the portion of the US Internal Revenue Code that allows for federal tax exemption of nonprofit organizations, specifically those that are considered public charities, private foundations or private operating foundations.
Entities that can seek 501(c)(3) determination from the IRS include corporations, trusts, community chests, LLCs, and unincorporated associations. The overwhelming majority of 501(c)(3) organizations are nonprofit corporations. The purpose of becoming a 501(c)(3) organization is to receive “tax-exempt” status from the IRS. In order to qualify for 501(c)(3) status, an entity must be organized and operated exclusively for religious, charitable, scientific, testing for public safety, literary, or educational purposes, or to foster national or international amateur sports competition, or for the prevention of cruelty to children or animals.
One of the most distinct provisions unique to Section 501(c)(3) organizations as compared with other tax exempt entities is the tax deductibility of donations. 26 U.S.C. § 170 provides a deduction, for federal income tax purposes, for some donors who make charitable contributions to most types of 501(c)(3) organizations. Other unique provisions tend to vary by state. Like federal law, most states allow for deductibility for state income tax purposes. Also, many states allow 501(c)(3) organizations to be exempt from sales tax on purchases, as well as exemption from property taxes. Furthermore, 501(c)(3) organizations fall into one of three primary categories: public charities, private foundations, and private operating foundations.
1. Public Charity – A public charity is generally defined by the IRS as “not a private foundation”. It receives a substantial portion of its revenue from the general public or from government. In order to remain a public charity (and not a private foundation), a 501(c)(3) must obtain at least 1/3 of its donated revenue from a fairly broad base of public support. Public support can be from individuals, companies and/or other public charities. Donations to public charities can be tax deductible to the individual donor up to 50% of the donor’s income. Corporate limits are generally 10%. In addition, public charities must maintain a governing body that is mostly made up of unrelated individuals.
2. Private Foundation – A private foundation is often referred to as a non-operating foundation, as in it typically does not have active programs. Revenue may come from a relatively small number of donors, even single donors. Private foundations are usually thought of as nonprofits which support the work of public charities through grants, though that is not always the case. Donations to private foundations can be tax deductible to the individual donor up to 30% of the donor’s income. Governance of a private foundation can be much more closely held than in a public charity. A family foundation is an example of a private foundation.
3. Private Operating Foundation – The least common of the three types, these organizations often maintain active programs similar to public charities, but may have attributes (such as close governance) similar to a foundation. As such, private operating foundations are often considered hybrids. Most of the earnings must go to the conduct of programs.
501(c)(3) organizations are highly regulated entities. Strict rules apply to both the activities and the governance of these organizations. No part of the activities or the net earnings can unfairly benefit any director, officer, or any private individual, and no officer or private individual can share in the distribution of any of the corporate assets in the event the organization shuts down. Additionally, lobbying, propaganda or other legislative activity must be kept relatively low. Intervention in political campaigns or the endorsement/anti-endorsement of candidates for public office is strictly prohibited.
In order for a corporation or other qualifying entity to receive 501(c)(3) status, it must apply to the IRS for recognition by filing Form 1023, Application for Recognition of Tax Exemption. The application is a thorough examination of the organization’s structure, governance and programs. 501(c)(3) organizations generally have to adhere to strict state compliance regulations as well.
So remember, when you are making a donation to a charity, pouring an ice bucket on your head, or walking with us on Saturday, September 27 at the Alzheimer’s Association Walk to End Alzheimer’s , please remember that there are strict compliance requirements for these charitable organizations. Additionally, if you are looking to set up a charity event or organization, it is important to know what regulations and rules you will be required to follow. As always, please feel free to stop by our office if you have questions about charitable organizations and we hope to see you tomorrow! |
Representational ImageCreative Commons
Alien and Unidentified Flying Objects (UFO) have been mind-boggling stuff since 1947 – the first time a well-known UFO sighting occurred. A businessman, who was flying his small plane, had claimed to have seen nine high-speed objects near Mount Rainier in Washington. He had said that the crescent-shaped objects had tremendous speed and moved "like saucers skipping on water."
Also read: UFOs spotted in large groups in US on the same day in 3 locations
Cut to 2004, Navy pilots encountered a UFO off the San Diego coast. According to an eyewitness, pilot David Fravor, the 40-foot Tic-Tac shaped white vehicle moved, unlike any other thing he had ever seen in the air with lightning speed.
Not only in these two incidents but UFOs are often reported to display bizarre aerodynamics, defying the laws of Physics, which human minds are still incapable of apprehending.
Former director of the Advanced Aerospace Threat Identification Program - Pentagon's program to identify and investigate UFOs, Luis Elizondo has put forward an explanation about "the physics of how it works".
"We do believe all these observables we've been seeing, sudden and extreme acceleration, hypersonic velocities, low observability, trans medium travel, and last but not least, positive lift, anti-gravity – is really the manifestation of a single technology," Elizondo said, according to Daily Star.
It is the ability to warp space-time, Elizondo explained, and not by a lot, but by a little.
Space and Time Warps theory says that the fourth dimension called the space-time continuum, which fuses the three dimensions of space and the one dimension of time, can be bent like a cloth when exposed to high gravity of objects.
Space-time wrap
Space and Time Warps theorycommons.wikimedia.org
Imagine a ball falling on fabric or a child playing on a trampoline. When the object hits the surface of material it creates dentures. Similarly, heavenly bodies with huge mass bend the space-time. Now, if the bend is large enough, it might help an object to time travel by creating a wormhole – a theoretical passage through space-time that could create shortcuts for long journeys across the universe.
Thus from here, another question arises: Are aliens time-travellers?
Outer Space, January 18, 2018, published an article about a former high-ranking US Marine who is on run from the US government for flying a "time-travelling" alien spaceship at Area 51.
The United States Air Force facility, commonly known as Area 51, is a highly classified remote detachment of Edwards Air Force Base in Nevada and people believe that US government is hiding evidence of extra-terrestrial life there. |
By DJ Huppatz and Agustin Chevez
The origins of the modern office lie with large-scale organisations such as governments, trading companies and religious orders that required written records or documentation. Medieval monks, for example, worked in quiet spaces designed specifically for sedentary activities such as copying and studying manuscripts. As depicted in Botticelli's St Augustine in His Cell, these early "workstations" comprised a desk, chair and storage shelves.
Another of Botticelli's paintings of St Augustine at work is now in Florence's Uffizi Gallery. This building was originally constructed as the central administrative building of the Medici mercantile empire in 1560.
But these were exceptions to the general rule. Over the course of the nineteenth and twentieth centuries, increasingly specialised office designs - from the office towers of Chicago and New York to the post-war suburban corporate campuses - reinforced a distinction between work and home.
Managing the office
Various management theories also had a profound impact on the office. As Gideon Haigh put it in The Office: A Hardworking History, the office was "an activity long before it was a place".
Work was shaped by social and cultural expectations even before the modern office existed. Monasteries, for example, introduced timekeeping that imposed strict discipline on monks' daily routines.
Later, modern theorists understood the office as a factory-like environment. Inspired by Frank Gilbreth's time-motion studies of bricklayers and Fredrick Taylor's Principles of Scientific Management, William Henry Leffingwell's 1917 book, Scientific Office Management, depicted work as a series of tasks that could be rationalised, standardised and scientifically calculated into an efficient production regime. Even his concessions to the office environment, such as flowers, were intended to increase productivity.
Technology in the office
Changes in technology also influenced the office. In the nineteenth and early twentieth century, Morse's telegraph, Bell's telephone and Edison's dictating machine, revolutionised both concepts of work and office design. Telecommunications meant offices could be separate from factories and warehouses, separating white and blue collar workers. Ironically, while these new technologies suggested the possibility of a distributed workforce, in practice, American offices in particular became more centralised.
But some of the same organisations that promoted and enabled the idea of work "anywhere, anytime" - Yahoo and IBM, for example - have cancelled work from home policies to bring employees back to bricks and mortar offices.
Why return to the office?
Although employers might be calling their employees back to the physical space of the office again, its boundaries are changing. For example, recent "chip parties", celebrate employees getting a radio-frequency identification implant that enables employers to monitor their employees. In the future, the office may be embedded under our skin.
While this might seem strange to us, it's probably just as strange as the idea of making multiple people sit in cubicles to work would have seemed to a fifteenth-century craftsman. The office of the future may be as familiar as home, or even our neighbour's kitchen table, but only time will tell. |
SHUR Wellness Smart Health Resources
fb pinterest google twitter
Health Blog
I talk to people all of the time who tell me that they eat healthy. I always ask, "Well, what does that mean exactly?" or "What exactly do you eat that’s healthy?” For breakfast, the responses are usually a lot of instant oatmeal. For lunch, it’s deli meat on whole grain bread. For dinner, it’s some sort of animal protein and vegetable. It's no wonder people in this country have such a hard time losing weight – no one knows what healthy is anymore.
If it says it’s healthy on a label, it's probably not healthy. Why? Because mostly processed foods have labels and most processed foods are not healthy. Let’s take instant oatmeal for example. Whether it’s one of those packets full of sugar and dried fruit or not, it is going to be high glycemic. High glycemic foods spike blood sugar and cause those items to be stored as fat, regardless of the 100 calorie label.
|
Like much of frontier land, this area was Cherokee hunting ground and soon pioneers receiving land grants came to Cosby to build their homes and forts, and farm their new land. The origin of the name "Cosby" is a mystery, with two theories. The first centers around an early trapper and distiller named Jonathan Cosby (sometimes spelled "Cozby"). The second suggests it was named after Dr. James Cozby, a Revolutionary War veteran and friend of John Sevier, who claimed some of the land. In any case, the name appears as early as 1838. While the area depended on farming and logging, the Great Depression and the establishment of Great Smoky Mountains National Park greatly affected the logging business and many residents turned to making corn whiskey from their crops for income. As liquor supplies were strained with the rise of prohibition in early 1900s, demand for "moonshine" grew steadily. During World War II, the Manhattan Project at Oak Ridge brought in people from all over the country. With many unaccustomed to Tennessee's dry laws, they turned to illegally distilled liquor, making the moonshine demand in Cosby even higher. Because of this, for the first half of the 20th century, Cosby was known as "The Moonshine Capital of the World."
Read MoreLess |
Bitcoin hardware
asic miner
Bitcoin mining protocol
The bitcoin network is a peer-to-peer payment network that operates on a cryptographic protocol. Users send and receive bitcoins, the units of currency, by broadcasting digitally signed messages to the network using bitcoin cryptocurrency wallet software. Transactions are recorded into a distributed, replicated public database known spil the blockchain, with overeenstemming achieved by a proof-of-work system called mining. The protocol wasgoed designed ter 2008 and released ter 2009 spil open source software by Satoshi Nakamoto, the name or pseudonym of the original developer/developer group.
The network requires minimal structure to share transactions. An ad hoc decentralized network of volunteers is sufficient. Messages are broadcast on a best effort fundament, and knots can leave and rejoin the network at will. Upon reconnection, a knot downloads and verifies fresh blocks from other knots to accomplish its local copy of the blockchain. [1] [Two]
A bitcoin is defined by a sequence of digitally signed transactions that began with the bitcoin’s creation, spil a block prize. The possessor of a bitcoin transfers it by digitally signing it overheen to the next proprietor using a bitcoin transaction, much like endorsing a traditional handelsbank check. A payee can examine each previous transaction to verify the chain of ownership. Unlike traditional check endorsements, bitcoin transactions are irreversible, which eliminates risk of chargeback fraud. [Trio]
Albeit it is possible to treat bitcoins individually, it would be unwieldy to require a separate transaction for every bitcoin ter a transaction. Transactions are therefore permitted to contain numerous inputs and outputs, [Four] [ better source needed ] permitting bitcoins to be split and combined. Common transactions will have either a single input from a larger previous transaction or numerous inputs combining smaller amounts, and one or two outputs: one for the payment, and one returning the switch, if any, to the sender. Any difference inbetween the total input and output amounts of a transaction goes to miners spil a transaction toverfee. [1]
To form a distributed timestamp server spil a peer-to-peer network, bitcoin uses a proof-of-work system. [Two] This work is often called bitcoin mining. The signature is discovered rather than provided by skill. [Five] This process is energy intensive. [6] Tens unit can consume more than 90% of operating costs for miners. [7] A gegevens center ter China, planned mostly for bitcoin mining, is expected to require up to 135 megawatts of power. [8]
Requiring a proof of work to provide the signature for the blockchain wasgoed Satoshi Nakamoto’s key innovation. [Five] The mining process involves identifying a block that, when hashed twice with SHA-256, yields a number smaller than the given difficulty target. While the average work required increases te inverse proportion to the difficulty target, a hash can always be verified by executing a single round of dual SHA-256.
For the bitcoin timestamp network, a valid proof of work is found by incrementing a nonce until a value is found that gives the block’s hash the required number of leading zero onverdraagzaam. Once the hashing has produced a valid result, the block cannot be switched without redoing the work. Spil straks blocks are chained after it, the work to switch the block would include redoing the work for each subsequent block.
Majority overeenstemming te bitcoin is represented by the longest chain, which required the greatest amount of effort to produce. If a majority of computing power is managed by fair knots, the fair chain will grow fastest and outpace any contesting chains. To modify a past block, an attacker would have to redo the proof-of-work of that block and all blocks after it and then surpass the work of the fair knots. The probability of a slower attacker catching up diminishes exponentially spil subsequent blocks are added. [Two]
To compensate for enlargening hardware speed and varying rente te running knots overheen time, the difficulty of finding a valid hash is adjusted toughly every two weeks. If blocks are generated too quickly, the difficulty increases and more hashes are required to make a block and to generate fresh bitcoins. [Two]
Difficulty Edit
Bitcoin mining is a competitive endeavor. An “arms wedren” has bot observed through the various hashing technologies that have bot used to mine bitcoins: basic CPUs, high-end GPUs common ter many gaming computers, FPGAs and ASICs all have bot used, each reducing the profitability of the less-specialized technology. Bitcoin-specific ASICs are now available. [9] Spil bitcoins become more difficult to mine, laptop hardware manufacturing companies have seen an increase te sales of high-end products. [Ten]
Computing power is often bundled together or “pooled” to reduce variance ter miner income. Individual mining equipments often have to wait for long periods to confirm a block of transactions and receive payment. Ter a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block. [11]
Bitcoin gegevens centers choose to keep a low profile, are dispersed around the world and tend to cluster around the availability of cheap electrical play. [7]
Energy consumption Edit
Ter 2013, Mark Gimein estimated electrical play use to be about 40.9 megawatts (982 megawatt-hours a day). [12] Ter 2014, Hass McCook estimated 80.7 megawatts (80,666 kW). [13] Spil of 2015, The Economist estimated that even if all miners used modern facilities, the combined tens unit consumption would be 166.7 megawatts (1.46 terawatt-hours vanaf year). [14] Te October 2017 it wasgoed estimated that the total energy use of bitcoin mining wasgoed overheen 634 megawatts (20 TWh/year). [15] [ better source needed ]
Verslaggever Matt O’Brien opined that it is not evident whether bitcoin is lowering transaction costs, since the costs are transformed into pollution costs, which he characterizes spil “environmental spillovers on everyone else, or what economists call negative externalities.” [16]
To lower the costs, bitcoin miners have set up te places like Iceland where geothermal energy is cheap and cooling Arctic air is free. [16] Chinese bitcoin miners are known to use hydroelectric power ter Tibet to reduce electrical play costs. [17]
Process Edit
A rough overview of the process to mine bitcoins is: [Two]
1. Fresh transactions are broadcast to all knots.
2. Each miner knot collects fresh transactions into a block.
3. Each miner knot works on finding a proof-of-work code for its block.
4. When a knot finds a proof-of-work, it broadcasts the block to all knots.
5. Receiving knots validate the transactions it holds and accept only if all are valid.
6. Knots express their acceptance by moving to work on the next block, incorporating the hash of the accepted block.
Mined bitcoins Edit
By convention, the very first transaction ter a block is a special transaction that produces fresh bitcoins wielded by the creator of the block. This is the incentive for knots to support the network. [1] It provides the way to stir fresh bitcoins into circulation. The prize for mining halves every 210,000 blocks. It commenced at 50 bitcoin, dropped to 25 ter late 2012 and to 12.Five bitcoin ter 2016. [Legal] This halving process is programmed to proceed for 64 times before fresh coin creation ceases. [Eighteen]
Various potential attacks on the bitcoin network and its use spil a payment system, real or theoretical, have bot considered. The bitcoin protocol includes several features that protect it against some of those attacks, such spil unauthorized spending, dual spending, forging bitcoins, and tampering with the blockchain. Other attacks, such spil theft of private keys, require due care by users. [Nineteen] [20] [21] [22] [23] [24] [25]
Unauthorized spending Edit
Unauthorized spending is mitigated by bitcoin’s implementation of public-private key cryptography. For example, when Alice sends a bitcoin to Bob, Bob becomes the fresh possessor of the bitcoin. Eve observing the transaction might want to spend the bitcoin Bob just received, but she cannot sign the transaction without the skill of Bob’s private key. [20]
Dual spending Edit
A specific problem that an internet payment system vereiste solve is double-spending, whereby a user pays the same coin to two or more different recipients. An example of such a problem would be if Eve sent a bitcoin to Alice and straks sent the same bitcoin to Bob. The bitcoin network guards against double-spending by recording all bitcoin transfers ter a ledger (the blockchain) that is visible to all users, and ensuring for all transferred bitcoins that they toevluchthaven’t bot previously spent. [20] : Four
Wedloop attack Edit
If Eve offers to pay Alice a bitcoin te exchange for goods and signs a corresponding transaction, it is still possible that she also creates a different transaction at the same time sending the same bitcoin to Bob. By the rules, the network accepts only one of the transactions. This is called a wedloop attack, since there is a wedstrijd which transaction will be accepted very first. Alice can reduce the risk of wedstrijd attack stipulating that she will not supply the goods until Eve’s payment to Alice shows up te the blockchain. [21]
A variant wedren attack (which has bot called a Finney attack by reference to Ridderzaal Finney) requires the participation of a miner. Instead of sending both payment requests (to pay Bob and Alice with the same coins) to the network, Eve issues only Alice’s payment request to the network, while the accomplice attempts to mine a block that includes the payment to Bob instead of Alice. There is a positive probability that the rogue miner will succeed before the network, te which case the payment to Alice will be rejected. Spil with the plain wedren attack, Alice can reduce the risk of a Finney attack by waiting for the payment to be included te the blockchain. [22]
History modification Edit
Each block that is added to the blockchain, embarking with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment ter bitcoin should wait for at least one confirmation to be distributed overheen the network, before assuming that the payment wasgoed done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully switch sides the transaction te a blockchain—unless the attacker controls more than half the total network power, te which case it is called a 51% attack. [23]
Deanonymisation of clients Edit
Deanonymisation is a strategy te gegevens mining ter which anonymous gegevens is cross-referenced with other sources of gegevens to re-identify the anonymous gegevens source. Along with transaction graph analysis, which may expose connections inbetween bitcoin addresses (pseudonyms), [Nineteen] [24] there is a possible attack [25] which linksaf a user’s pseudonym to its IP address. If the peer is using Tor, the attack includes a method to separate the peer from the Tor network, forcing them to use their real IP address for any further transactions. The attack makes use of bitcoin mechanisms of relaying peer addresses and anti-DoS protection. The cost of the attack on the total bitcoin network is under €1500 vanaf month. [25]
Each miner can choose which transactions are included te or exempted from a block. [26] A greater number of transactions ter a block does not equate to greater computational power required to solve that block. [26]
Upon receiving a fresh transaction a knot voorwaarde validate it: ter particular, verify that none of the transaction’s inputs have bot previously spent. To carry out that check the knot needs to access the blockchain. Any user who does not trust his network neighbors, should keep a utter local copy of the blockchain, so that any input can be verified.
Spil noted te Nakamoto’s whitepaper, it is possible to verify bitcoin payments without running a utter network knot (simplified payment verification, SPV). A user only needs a copy of the block headers of the longest chain, which are available by querying network knots until it is apparent that the longest chain has bot obtained. Then, get the Merkle branch linking the transaction to its block. Linking the transaction to a place te the chain demonstrates that a network knot has accepted it, and blocks added after it further establish the confirmation. [1]
While it is possible to store any digital opstopping te the blockchain, the larger the transaction size, the larger any associated fees become. [27] Various items have bot embedded, including URLs to child pornography, an ASCII kunst picture of Ben Bernanke, material from the Wikileaks cables, prayers from bitcoin miners, and the original bitcoin whitepaper. [28]
The use of bitcoin by criminals has attracted the attention of financial regulators, legislative bods, law enforcement, and the media. [29] The FBI ready an intelligence assessment, [30] the SEC has issued a pointed warning about investment schemes using virtual currencies, [29] and the U.S. Senate held a hearing on virtual currencies te November 2013. [31]
Several news outlets have asserted that the popularity of bitcoins hinges on the capability to use them to purchase illegal goods. [32] [33] Te 2014, researchers at the University of Kentucky found “sturdy evidence that pc programming enthusiasts and illegal activity drive rente ter bitcoin, and find limited or no support for political and investment motives.” [34]
Black markets Edit
A CMU researcher estimated that te 2012, Four.5% to 9% of all transactions on all exchanges ter the world were for drug trades on a single dark web drugs market, Silk Road. [35] Child pornography, [36] murder-for-hire services, [37] and weapons [38] are also allegedly available on black market sites that sell te bitcoin. Due to the anonymous nature and the lack of central control on thesis markets, it is hard to know whether the services are real or just attempting to take the bitcoins. [39]
Several deep web black markets have bot shut by authorities. Ter October 2013 Silk Road wasgoed shut down by U.S. law enforcement [40] [41] [42] leading to a short-term decrease te the value of bitcoin. [43] Ter 2015, the founder of the webpagina wasgoed sentenced to life ter prison. [44] Alternative sites were soon available, and ter early 2014 the Australian Broadcasting Corporation reported that the closure of Silk Road had little influence on the number of Australians selling drugs online, which had actually enlargened. [45] Te early 2014, Dutch authorities closed Utopia, an online illegal goods market, and seized 900 bitcoins. [46] Ter late 2014, a snaak police operation witnessed European and American authorities seize bitcoins and close 400 deep web sites including the illicit goods market Silk Road Two.0. [47] Law enforcement activity has resulted ter several convictions. Te December 2014, Charlie Shrem wasgoed sentenced to two years te prison for indirectly helping to send $1 million to the Silk Road drugs webpagina, [48] and te February 2015, its founder, Ross Ulbricht, wasgoed convicted on drugs charges and faces a life sentence. [49]
Some black market sites may seek to steal bitcoins from customers. The bitcoin community branded one webpagina, Sheep Marketplace, spil a scam when it prevented withdrawals and shut down after an alleged bitcoins theft. [50] Ter a separate case, escrow accounts with bitcoins belonging to patrons of a different black market were hacked ter early 2014. [51]
According to the Internet See Foundation, a UK-based charity, bitcoin is used to purchase child pornography, and almost 200 such websites accept it spil payment. Bitcoin isn’t the foot way to purchase child pornography online, spil Troels Oertling, head of the cybercrime unit at Europol, states, “Ukash and Paysafecard. have [also] bot used to pay for such material.” However, the Internet Witness Foundation lists around 30 sites that exclusively accept bitcoins. [36] Some of thesis sites have shut down, such spil a deep web crowdfunding webstek that aimed to fund the creation of fresh child porn. [52] [ better source needed ] Furthermore, hyperlinks to child porn websites have bot added to the blockchain spil arbitrary gegevens can be included when a transaction is made. [53] [54]
Malware Edit
Malware stealing Edit
Some malware can steal private keys for bitcoin wallets permitting the bitcoins themselves to be stolen. The most common type searches computers for cryptocurrency wallets to upload to a remote server where they can be cracked and their coins stolen. [55] Many of thesis also loom keystrokes to record passwords, often avoiding the need to crack the keys. [55] A different treatment detects when a bitcoin address is copied to a clipboard and quickly substitutes it with a different address, tricking people into sending bitcoins to the wrong address. [56] This method is effective because bitcoin transactions are irreversible. [57] : 57
One virus, spread through the Pony botnet, wasgoed reported ter February 2014 to have stolen up to $220,000 te cryptocurrencies including bitcoins from 85 wallets. [58] Security company Trustwave, which tracked the malware, reports that its latest version wasgoed able to steal 30 types of digital currency. [59]
A type of Mac malware active te August 2013, Bitvanity posed spil a vanity wallet address generator and stole addresses and private keys from other bitcoin client software. [60] A different trojan for macOS, called CoinThief wasgoed reported te February 2014 to be responsible for numerous bitcoin thefts. [60] The software wasgoed hidden ter versions of some cryptocurrency apps on and MacUpdate. [60]
Ransomware Edit
Many types of ransomware request payment te bitcoin. [61] [62] One program called CryptoLocker, typically spread through legitimate-looking email attachments, encrypts the hard drive of an infected rekentuig, then displays a countdown timer and requests a ransom te bitcoin, to decrypt it. [63] Massachusetts police said they paid a Two bitcoin ransom te November 2013, worth more than $1,300 at the time, to decrypt one of their hard drives. [64] Bitcoin wasgoed used spil the ransom medium te the WannaCry ransomware. [65] One ransomware variant disables internet access and requests credit card information to restore it, while secretly mining bitcoins. [63]
Unauthorized mining Edit
Ter June 2011, Symantec warned about the possibility that botnets could mine covertly for bitcoins. [66] Malware used the parallel processing capabilities of GPUs built into many modern movie cards. [67] Albeit the average PC with an integrated graphics processor is virtually futile for bitcoin mining, ems of thousands of PCs laden with mining malware could produce some results. [68]
Ter mid-August 2011, bitcoin mining botnets were detected, [Sixty nine] and less than three months zometeen, bitcoin mining trojans had infected Mac OS X. [70]
Te April 2013, electronic sports organization E-Sports Entertainment wasgoed accused of hijacking 14,000 computers to mine bitcoins, the company zometeen lodged the case with the State of Fresh Jersey. [71]
German police arrested two people ter December 2013 who customized existing botnet software to perform bitcoin mining, which police said had bot used to mine at least $950,000 worth of bitcoins. [72]
For four days ter December 2013 and January 2014, Yahoo! Europe hosted an ad containing bitcoin mining malware that infected an estimated two million computers. [73] The software, called Sefnit, wasgoed very first detected ter mid-2013 and has bot bundled with many software packages. Microsoft has bot removing the malware through its Microsoft Security Essentials and other security software. [74]
Several reports of employees or students using university or research computers to mine bitcoins have bot published. [75]
Money laundering Edit
Bitcoins may not be ideal for money laundering, because all transactions are public. [76] Authorities, including the European Banking Authority [77] the FBI, [30] and the Financial Activity Task Force of the G7 [78] have voiced concerns that bitcoin may be used for money laundering. Ter early 2014, an technicus of a U.S. bitcoin exchange, Charlie Shrem, wasgoed arrested for money laundering. [79] Subsequently, he wasgoed sentenced to two years te prison for “aiding and abetting an unlicensed money transmitting business”. [48] A report by UK’s Treasury and Huis Office named “UK national risk assessment of money laundering and terrorist financing” (2015 October) found that, of the twelve methods examined te the report, bitcoin carries the lowest risk of being used for money laundering, with the most common money laundering method being the banks. [80]
Ponzi scheme Edit
Te a Ponzi scheme that utilized bitcoins, The Bitcoin Savings and Trust promised investors up to 7 procent weekly rente, and raised at least 700,000 bitcoins from 2011 to 2012. [81] Te July 2013 the U.S. Securities and Exchange Commission charged the company and its founder te 2013 “with defrauding investors te a Ponzi scheme involving bitcoin”. [81] Te September 2014 the judge fined Bitcoin Savings &, Trust and its holder $40 million for operating a bitcoin Ponzi scheme. [82]
Theft Edit
There have bot many cases of bitcoin theft. [83] One way this is accomplished involves a third party accessing the private key to a victim’s bitcoin address, [84] or of an online wallet. [85] If the private key is stolen, all the bitcoins from the compromised address can be transferred. Te that case, the network does not have any provisions to identify the thief, block further transactions of those stolen bitcoins, or terugwedstrijd them to the legitimate possessor. [86]
Theft also occurs at sites where bitcoins are used to purchase illicit goods. Ter late November 2013, an estimated $100 million ter bitcoins were allegedly stolen from the online illicit goods marketplace Sheep Marketplace, which instantly closed. [87] Users tracked the coins spil they were processed and converted to metselspecie, but no funds were recovered and no culprits identified. [87] A different black market, Silk Road Two, stated that during a February 2014 hack, bitcoins valued at $Two.7 million were taken from escrow accounts. [51]
Sites where users exchange bitcoins for metselspecie or store them ter “wallets” are also targets for theft., an Australian wallet service, wasgoed hacked twice te October 2013 and lost more than $1 million te bitcoins. [88] Te late February 2014 Mt. Gox, one of the largest virtual currency exchanges, filed for bankruptcy ter Tokyo amid reports that bitcoins worth $350 million had bot stolen. [89] Flexcoin, a bitcoin storage specialist based ter Alberta, Canada, shut down on March 2014 after telling it discovered a theft of about $650,000 ter bitcoins. [90] Poloniex, a digital currency exchange, reported on March 2014 that it lost bitcoins valued at around $50,000. [91] Te January 2015 UK-based bitstamp, the third busiest bitcoin exchange globally, wasgoed hacked and $Five million ter bitcoins were stolen. [92] February 2015 eyed a Chinese exchange named BTER lose bitcoins worth almost $Two million to hackers. [93]
A major bitcoin exchange, Bitfinex, wasgoed hacked and almost 120,000 bitcoins (around $60m) wasgoed stolen te 2016. Bitfinex wasgoed coerced to suspend its trading. The theft is the 2nd largest bitcoin heist everzwijn, dwarfed only by Mt. Gox theft te 2014. According to Forbes, “All of Bitfinex’s customers. will stand to lose money. The company has announced a haircut of 36.067% across the houtvezelplaat.” [94]
Related movie: Bitcoin (BTC) Evening Update: When ter doubt, it’s a TRIANGLE!!
Leave a Reply
|
Skip to main content
Citizen science, youth engagement and authentic inquiry
Pamela-Nippolt.jpgWhat are the best ways to engage youth and adults in authentic scientific inquiry? We are exploring this question with our Driven to Discover: Citizen Science project.
Public participation in science, known as citizen science, is when citizens collect and report data, using specified methods, to contribute to scientific research. In our Driven to Discover project, research teams made up of youth and adult citizen scientists are monitoring Monarch butterfly larvae, birds, and water quality, then conducting investigations.
This five-year project is now entering its fourth summer. Through it, we are designing a model and curriculum to prepare and support adults - content experts, youth leaders, parents. Their reasons for participation vary -- to volunteer, to extend their teaching, to deepen youth programs in nature settings, to learn through inquiry with youth.
Spring is a busy time for this project. A new group of adults has just completed a three-day workshop, and middle school-age youth are signing up to be citizen scientists through 4-H, Girl Scouts, their local nature centers, and through summer programs at their schools. Our main goals are to engage youth in citizen science, and to encourage them to do authentic inquiry. Along with those big goals, the youth in the programs can build their environmental and service ethic.
You may ask, "What does citizen science have to do with authentic inquiry?" youth-holding-Monarch.jpg As we work with a dozen or more teams from four states each year, and with the financial support of the National Science Foundation, our surveys of participants tell us that citizen science is a great "on ramp" for engaging youth to investigate their own questions about the world.
A teacher who leads a summer program noted the benefits for youth when they experience "real world" research outside of the classroom:
"That's very exciting, one of my groups really modeled so well how the inquiry process isn't linear because they ... started their observation and then they noticed something and then they went back and they wanted to tweak their question, which was of course OK, and then they got a little farther, and these are fifth graders, and so each time they would clarify their question more... We're learning it a lot of times as linear - you come up with these questions, you do your hypothesis, you do your procedure and you ... follow steps. But I think because I'm not working with 120 (students) right now I'm just working with the 12 (youth), I had that chance to be able to say "No you can go back and do that and it can be kind of messy, that's ok and so that was what was good."
One young person offered an insight about how her learning in the program transferred back to the classroom:
"And you really can learn a lot like I did something I was doing an experiment that showed which part of or which milkweed plant part was ... the most nutritious. And I raised so many Monarchs that I will feed them that food now, cause I know that they will grow and have a high survival rate. So it's just really helpful too to know, and you can teach so many other people. And there's so much stuff that you get from this experience that you don't even realize that you have learned until later when ... you'll be in class and we'll be learning about something else and the whole class will be... confused and I'll be like oh I know this cause it's like even when you weren't studying it that specifically you remember it cause it's something you just happened to learn while you were outside."
There is no question that youth are doing "real" science. Stay tuned for results from our ongoing research of the project. We will be sharing lessons about the model and what we learn about how it prepares adults and promotes learning for youth. In the meantime, I would like to know what you are doing. What are some of the ways that we can expand how we engage youth as citizen scientists in youth programs?
-- Pamela Larson Nippolt, evaluation and research specialist
1. Pam Larson NippoltJune 5, 2013 at 9:37 AM
Trudy - thank you so much for mentioning the work at Cornell to connect 4-H and Citizen Science. The webinar next week should give us a good idea about the opportunities and possibilities in the near future to involve youth in scientific research - research being done by others and research that comes from the youth. I'm glad you are involved in helping us to think about this at a national level. What are you seeing nationally? Pam
2. Pam - the full scale inquiry process I think is rare, but well worth doing. What I am seeing nationally is the opportunity for the "micro" citizen scientist, and "crowd sourcing". Opportunities to do something that can take just a little bit of time -- from a few minutes to a weekend. The other trend is crowd sourcing - where your and my efforts are pooled with that of others to do the science. Some of these interesting projects include Fold It, a project promoted as an online game enabling you to contribute to important scientific research around protein folding, and Ancient Lives, a social science project where you get a bit of ancient papyri and transcribe it. Phenology projects are some of the most popular, but increasingly we are tying these into current issues, such as the Backyard Bee Count.
3. Pam Larson NippoltJune 6, 2013 at 3:30 AM
Trudy - Your perspective on the types of citizen science is really helpful. I am interested in digging deeper into the benefits for young people when they take more time to do authentic inquiry in nonformal settings through Citizen Science as compared to (perhaps more highly accessible) types of Citizen Science that offer more touch points across more settings to more youth.
I wonder if the types of outcomes we can expect for youth across Citizen Science types have been considered? Pam
4. Karen OberhauserJune 6, 2013 at 3:16 PM
The differences between obtaining valuable citizen science data and engaging participants in the process of inquiry sometimes cause tension. Inquiry takes participants all the way from asking questions to sharing their own findings with others, and we've really learned that combining this whole process with citizen science takes a lot of very deliberate nurturing. If the main goal is "crowd-sourcing", or getting work done efficiently by a lot of people, participants don't engage in the whole process. I liked Trudy's use of the term "micro citizen scientist" to refer to this smaller level of engagement. Rob Blair, on the UM FWCE team, once use the term "citizen technicians" to refer to the same thing. Certainly, people will have a lot of different goals when they engage in citizen science, and it's important to recognize (and celebrate) these. It's been exciting (and not 100% easy) to work on trying to "marry" fields of citizen science and inquiry learning.
5. Pam Larson NippoltJune 7, 2013 at 2:47 AM
Karen, you are so right. Integrating authentic inquiry as a goal through Citizen Science is multi-layered and not a straight forward proposition in the context of a youth program but the benefits are worth it, in my estimation! Trudy's observations about the overall landscape of CS in youth programs remind me that choices in how we design youth programs are guided by the benefits that youth (and the adults who care about them and partner with them) want and need.
I can also see, for example, that the connections to a global community that could result from "crowd sourcing" would be a worthy outcome goal for youth. Pam |
Hormone Series – Part VI: Cortisol
The adrenals are two triangular shaped glands located on top of each kidney. Cortisol is one of several hormones released by these powerful glands. It is released as a “stress hormone.”
Cortisol controls:
1. Blood sugar
2. Fat and Protein mobilization
3. Prevents inflammation
4. Will make the liver make sugar from fat
The pituitary gland activates the adrenal gland by secreting ACTH. ACTH is adrenocorticotropic hormone. It stimulates the “cortical” layer of the gland to make cortisol. Cortisol has distinct bio-rhythms. It is high in the morning and by the evening is down. Stress alters the rhythm and may eventually cause the gland to become “exhausted.” “Adrenal Fatigue: The 21st Century Stress Syndrome” by James Wilson, ND, PhD, is an excellent book to explain why and how cortisol depletion can result in severe exhaustion. Unfortunately this hormone is not understood by most physicians. It is a test rarely ordered and a syndrome basically ignored.
Stress factors:
1. Anger
2. Fear
3. Death of family member
4. Divorce
5. Marriage
6. Financial Worries
7. Job
8. Relationships
9. Personal Illness
10. In-laws
Just to name a few, are viewed as stress. These issues if chronic and severe can totally deplete this vital hormone. Thyroid and severe adrenal stress go hand in hand. Low blood pressure as well as low blood sugar may be the only symptoms. Recovery from adrenal stress can take up to a year with treatment to resolve.
Cortisol is vital to the feeling of well-being. Longevity and quality of life are severely compromised when this powerful and needed hormone is barely available. Patients will rely on sugar and caffeine to “boost” their drive because they are unaware as to the real reason for their chronic fatigue.
Since the adrenal gland is needed for survival when compromised, all the other glands suffer as well. The thyroid gland, in trying to pick up the slack, will, in time, become hypo active itself, further compounding the situation.Cortisol-is-a-hormone-300x210
Eventually the immune system falters and Lupus, Crohn’s, colitis, chronic sinus and infections can plague the individual. Abdominal obesity (cortisol paunch) along with decreased HDL cholesterol, increased triglycerides and increased blood pressure herald the demise of this vital hormone. There is acute adrenal fatigue, and mild and high adrenal fatigue. Saliva testing of the morning, noon, evening and night cortisol levels is the best way to determine the level of fatigue.
At The Baucom Institute, treatment is based on the stage of fatigue and support is given to the glands until they are healed. We also encourage your lifestyle and diet be altered. Of course, alleviating the stress factors is paramount to getting the most out of your treatment.
What is your stress level? What do you think your level of well-being is right now? |
Little Known Facts About Buy Video Production.
What's Video production?
Video production is the practice of producing movie by shooting images (videography), and creating combinations and reductions of parts of this video in live production and post-production (video editing). In most cases the captured video will be recorded on the most current electronic media such as SD cards. In the past footage has been recorded on video tape, hard disk, or solid state storage. Video tape capture has become obsolete and solid state storage is reserved for only storage. It's currently distributed digitally in formats like the Moving Picture Experts Group format (.mpeg, .mpg, .mp4), QuickTime (.mov), Audio Video Interleave (.avi), Windows Media Video (.wmv), and DivX (.avi, .divx). It's the equal of filmmaking, but with images recorded digitally rather than on film stock.
Practically, video production is the art and service of creating content and delivering a finished video product. This can include production of televIsion programs, television commercials, corporate videos, event videos, wedding videos and special-interest home videos. A video production can range in size. Examples include:
Shooting techniques and styles include:
• Using a tripod to get a locked-down, stable shooter;
• hand-held for a bigger frame of movement to attain more jittery camera angles or looser shots to portray natural motion
• integrating various camera angles like the Dutch angle (see Mission Impossible), Whip pan (see the opening of Hot Fuzz) and Whip zoom (watch the Kiddo/Driver fight in Kill Bill Vol. 2);
• on a jib or crane which easily soars to varying heights as seen from the finale of the film Grease;
• with a Steadicam for smooth movement as the camera operator incorporates moving cinematic techniques such as moving through rooms, as seen in The Shining.
Video Production Process
Video production is basically the entire process of creating a video. Whether it's a short film, a full-length movie, company advertising video, tv commercial, music video, or other sort of film, the procedure may vary somewhat with the particulars, but the general process is fundamentally the same. The basic process can be separated into three subcategories.
These three subcategories include all aspects of video production, from the moment an idea pops into your head to the moment the film is released to the public. In this article, we will attempt to supply you with the obvious definition of video production by describing the whole process of video production.
3 Chief Stages of Video Production
1. Pre-production
This is the planning phase. There'll be no recording during this process, just preparation.
• An idea is formed
• The script is written
• The cast is selected
• The audio and video team members are selected
Scene locations are chosen, the script is revised and edited if needed, and a summary of the entire recording process is created.
There are many additional factors that must be reviewed as well. Appropriate lighting for each scene is crucial. Sunlight and artificial lighting don't often mix well, so the time of day, weather conditions, and place for each scene has to be carefully chosen.
2. Production
Once all the cast and crew have been hired, and the script was edited and approved, the actual manufacturing process can begin. Crew and cast members travel to each location, and each scene is shot until it is satisfactory. Then everyone will move to the next scene. This process repeats until each scene in the movie was shot. After each scene has been properly shot, it's time to move on to another stage of post-production.
3. Post-production
Post-production covers all activities that are performed after the actual shooting of the movie was completed. This includes merging each scene, syncing audio and video, editing audio and video, and adding special effects.
Professional Video Production
There are many businesses that offer video production as a service. This permits more info companies and individuals that don't have any filmmaking experience to make marketing videos or other business-related videos to enhance their company image, and showcase their services and products.
For video production to be successful, there has to be much more behind it than just a man with a camera. The video has to be distributed and targeted correctly, or the movie will only reach a small number of potential customers. A video describing a general summary of your goods and/or services is great when you have a stand-out niche, but if you have competition, your video has to demonstrate the prospective customer why they should choose your company over your competitor's company. For this reason, you might achieve better results by creating several short videos, each targeted at a particular demographic. The movies can then be distributed through the correct platforms to reach the maximum number of individuals who could be interested in your business's services.
For professional video production contact Busyboy Productions at
Leave a Reply
|
Tuesday, February 6, 2018
Scientists have used Einstein's Theory of Relativity to calculate how time is measured in deep space flights. The conclusion is itself a paradox. For a deep space mission, the astronauts may age much more slowly traveling at the speed of light. For example, they may age 28 years on a light speed travel across the universe, but return to Earth 1,300 years later.
The fact that deep space travel can cause a return trip to take 1,300 years in "local" time explains why aliens have never returned to Earth.
Another factor in deep space travel is that human beings do not do well with forces over 1 g. We are basically water bags that can pop under pressure. Scientists think the best deep space travelers would be spiny, thin, small alien grays.
As private space firms have advertised in their speculative missions to colonize Mars, even solar system space travel is a one way street. If you plan to go out into deep space, the chance of your returning home is near zero.
Which brings us to a hypothesis in LOST.
Some believe the island may have been some lost alien space craft. If true, then Jacob, the island guardian would have been the alien pilot and his brother his co-pilot. If these space aliens came from a distant solar system with advanced technology, they could have crash landed on Earth without the means of repairing their ship.
The clues of being space aliens comes in the form of their physical presence. Jacob and especially MIB appear to be shape-shifting smoke monsters. They can change their physical structure, morph into human beings or monsters. This would make sense for deep space travelers to avoid the pitfalls of human bodies. If these alien travelers were not humanoids but energy beings, they could survive deep space flight.
A further clue on the island aliens is that Jacob's narrative that people who come to the island are from "shipwrecks." This mirrors his own situation. By bringing people to the island looking for a solution to his problem, Jacob cleverly puts the humans in the same position he is in: lost, looking for a way "home."
And the human beings brought to the island have been a clever bunch. Dharma and the military brought vast resources including nuclear technology and experimentation on electromagnetic properties including time travel. Perhaps these Earth technologies were being used to try to re-boot the space craft island so Jacob could indeed return "home" as MIB kept saying to the castaways. But MIB continues to get frustrated with the humans who want to take their advanced technology and use it to increase their own power on Earth. In order to control them, Jacob and MIB use human history of "gods" including borrowing ancient Egyptian rites, to control the humans on the island.
In essence, the series concludes not with the humans getting home, but the aliens finding a way to end their existence on a distant planet far away from their home. After centuries of failed attempts to get their ship technology working, Jacob and MIB apparently release themselves from their species protections (the immortality we saw during the show) in order to cease to exist. In that way, their alien technology does not corrupt the Earth society as they had found humans to be barbaric and crude in their emotional states. |
Written by Linda Bove
Illustrator Tom Cooke
Published 1980
Publisher Random House/CTW
ISBN 0-394-84212-X
Sign Language Fun with Linda Bove is a children's book that teaches basic sign language. Pictures of Linda signing words and phrases are interspersed with drawings of Sesame Street characters performing the activities described. Topics covered include "In the Morning", "Family", "School Days", "Colors", "On the Farm", "Playground Fun", "Things that are Opposite", "Action Words", "People in the Neighborhood", "Spring", "Summer", "Autumn", "Winter", "Utensils and Food", "In the Woods", "How People Get Around", "In the Jungle", "The Way You Feel", and "Nighttime." Additionally, the letters of the alphabet are inside the front cover, and numbers from 1 to 10 are inside the back cover.
The title page of the book states that it was prepared in cooperation with the National Theatre of the Deaf. In a short foreword entitled "About Linda Bove", it states that
"Linda has put together this unique picture book with the help of her Sesame Street friends for any child or parent who enjoys discovering and describing the world in new ways."
Much of this material was later included in The Sesame Street Treasury series. |
Modes of Running Linux Operating Systems and Programs on Your Computer
Modes of Running Linux Operating Systems and Programs on Your Computer
People today often use Windows or MacOS as their computers’ operating systems. They are designed to offer utmost convenience for users, making computing look simpler than what it’s supposed to. Nevertheless, Linux shouldn’t be left behind as it also has features that many people need, resulting to more individuals using Linux OS and software today.
Linux as compared to others
Linux is perhaps an underrated operating system, but it offers more features that maximize computing experience at its finest. First, the operating system is offered at no cost being an open source OS version. Second, Linux doesn’t lose in terms of compatible programs as many developers come up with new software people need for daily computing. They have enhanced their interface that makes it easier to use for today’s computer owners since a lot are familiar with Windows and MacOS’ interface. With the similarity, using the programs will also be easier, allowing faster computing at all times.
Aside from people who wish to try this operating system and related softwares, many individuals are required to use the platform for program developing and testing. Hence, it’s crucial for them to have the operating system installed on their computers. The problem for starting Linux developers or users, however, is how they can install the programs and operating system in a computer without installing their original Windows or MacOS. If you’re among these individuals, here are some options on how to run Linux on your current operating system.
Install through accessory programs
Several accessory programs let you run Linux operating systems without uninstalling your current operating system. Examples of these are Wubi and AndLinux. These platforms will install Linux operating systems like Ubuntu, which will run your Linux-compatible programs like a joy.
You can download these platforms online by searching for it online. Since they are open source programs, you can download them on multiple websites and from developers’ pages aside from their homepages. After downloading, you can install and run them on Windows or MacOS or uninstall them whenever you need.
However, keep in mind that several points should be taken in mind before installing these platforms. First, check if the platform you’ll get is compatible with your computer’s current operating system. For example, some of these platforms are incompatible with Windows 64-bit OS. Several of them won’t work in Windows 8. It’s a must to check their details first before downloading to avoid inconsistencies.
Virtual operating system
Running Linux virtually is also a good option in using this operating system and running program. Instead of using Linux with your current operating system, running the program virtually means you’re setting a separate environment compatible for Linux. This is beneficial if you prefer to not consume memory or hard drive space in operating Linux programs. Several guides walk you through using these operating systems whenever you want to.
Linux programs and main platform can run on your current operating system. Simply choose your preferred mode and you will get the computer running in opening Linux-based software with ease.
Leave a Reply
Pin It on Pinterest
Share This |
The Geology of the area in and around Bulawayo area has a high economic potential in terms of minerals found within Greenstone belt terrain, these minerals include precious metals such as gold and Base minerals such as tungsten as well as Dimension stones such as Granite, slate and sandstone.
Energy minerals such coal and Gas are found further north in the Mid-Zambezi basin coal measures of Lupane and Hwange
Currently the mining industry in Matabeleland North is dominated by Gold mining whereas there is a need to develop mining of dimension stones, building aggregates and base minerals to supply the industry e.g. Granite, limestone and slate.
There is a decline in the mining of base minerals in the Province, Tin, Tantalite and Scheelite mining has stopped altogether although there are vast resources such as the Kamativi mine which is currently being resuscitated.
Page Province: |
Tolkien Gateway
Rings of Power
[edit] Twenty Rings
Three Rings for the Elven-kings under the sky,
Seven for the Dwarf-lords in their halls of stone,
Nine for Mortal Men doomed to die,
One for the Dark Lord on his dark throne
In the Land of Mordor where the Shadows lie
One ring to bring them all and in the darkness bind them
In the Land of Mordor where the Shadows lie.
[edit] History
[edit] Creation
Celebrimbor forges the Rings of Power
[edit] Advent of Sauron
Sauron then distributed them to Lords who desired secret power beyond their nature, hoping to bring them under his sway; Men who were the readiest to his will, became powerful sorcerers and Kings; and Dwarves who grew greedier and augmented their treasures. As Sauron had to do with ther making, he easily perverted and accursed the Rings, betraying those who wore them.[2]
The Mannish lords who held the Nine were consumed by them and entered the wraith-world, becoming the Ringwraiths, servants of Sauron without will. The Dwarves who held the Seven were largely (but not totally) unaffected, but the wrath and greed brought upon them brought evils that benefitted Sauron. The Three were always held by the Elves, and Gandalf upon his arrival.[2]
[edit] Final disposition
[edit] Powers and properties
The Rings of Power all had certain common properties. The Elves of Eregion created the rings to preserve their lands, attempting to make them as beautiful as Valinor. Thus, a primary power of the rings was to prevent and decelerate decay and change. The rings also increased a bearer's own natural powers, seemingly granting 'magic' abilities.[6]
The Dwarves however were more resistant to most of these effects. They mostly suffered under an increased lust for gold, which provided occasion for quarrels among themselves. They used their rings to increase their treasure troves; the treasure hoards of these dwarves drew the mightiest of dragons and opponents.[2]
The Three did not make their wearers invisible[6] (though a wearer could make the ring itself invisible[8]). A wearer of one of the Rings of Three gained the power to heal and preserve, in many different ways, whatever they controlled. Galadriel's and Elrond's Rings allowed them to fend off Sauron and protect and preserve Lothlorien and Rivendell. Narya also had the power to inspire hope and courage in others.[9]
[edit] The One
Main article: The One Ring
For The One to have the ability to control The Three, it was necessary for Sauron to allow a significant amount of his power and will to flow into it during its forging. As it was the Master Ring, whoever mastered the One also had control over the other rings, the works done through them, and also could perceive and control the thoughts of anyone wearing another ring. But Sauron never managed to do so, because as soon as he wore it upon his finger, the Elves became aware of him.[2]
The wearer also was able to understand speech in languages the wearer did not know, or at least able to understand the Black Speech.[10]
Any bearer could use its power, though it would take time, determination, skill, and knowledge to do so. However the Ring corrupted the heart and mind, making its wearer obsessed with it.
[edit] Other versions of the legendarium
[edit] Inspiration
[edit] Portrayal in adaptations
1978: Ralph Bakshi's The Lord of the Rings
In the introduction, narrated by Galadriel, the 19 initial Rings were shown being given to the Elves, Men, and Dwarves. The introduction states that all of these ring-holders were deceived by Sauron, who created the One Ring to rule them all.
[edit] External links
6. 6.0 6.1 6.2 J.R.R. Tolkien; Humphrey Carpenter, Christopher Tolkien (eds.), The Letters of J.R.R. Tolkien, Letter 131, (undated, written late 1951)
Rings of Power
The One Ring
Three Rings
(Narya · Nenya · Vilya)
Seven Rings
(Ring of Thrór)
Nine Rings |
Permit Test 5
Permit Test 5
1. This sign means:
The road ahead has many curves
There is a sharp curve in the road ahead
The road ahead may be slippery
2. If you always insist on letting other drivers go ahead of you at intersections you are most likely:
Causing traffic delays
Improving traffic flow
Effectively using defensive driving techniques
3. At dawn or dusk, or in rain or snow, it can be hard to see and be seen. A good way to let other drivers know you are there is to:
Use your horn every once in a while
Turn on your parking lights
Turn on your low-beam headlights
4. You are driving on a one-way street. You may turn left onto a one-way street:
Only if a sign permits the turn
If traffic on the street moves to the right
If traffic on the street moves to the left
5. Which of these statements is true about road construction zones?
Fines are the same for violations committed in construction zones
You are responsible for the safety of the road workers
Slow down only if you think workers are present
6. You should allow more space in front of your vehicle when following large trucks because:
You need the extra room to see around the truck
Their heavier weight allows them to stop more quickly than you
If you follow too closely, you will get caught in the truck's wind draft
7. This sign means:
The traffic signal ahead is not working
Be prepared to stop if the light is flashing
There is a traffic signal ahead
8. This sign means:
One-lane road ahead
Merging lane ahead
Lane ends ahead
9. You were in an accident which caused more than $1000 worth of damage. You must report the accident within 10 days to:
The DMV
The CHP
Your insurance company
10. You may cross double, yellow lines to pass another vehicle if the:
Vehicle in front of you moves to the right to let you pass
Yellow line next to your side of the road is broken
Yellow line next to the other side of the road is broken
11. At intersections, crosswalks, and railroad crossings, you should always:
Stop, listen, and proceed cautiously
Look to the sides of your vehicle
Pass vehicles that seem to be stopped for no reason
12. It is illegal for a person under 21 years of age to drive with a blood alcohol concentration (BAC) that is _____ or more.
0.08%-Eight hundredths of one percent
0.01%-One hundredth of one percent
0.05%-Five hundredths of one percent
13. Large trucks turning right onto a street with two lanes in each direction:
May complete their turn in either the left or right lane
Must stay in the right lane at all times
14. To see cars in your blind spots, you should check:
The inside rearview mirror
The outside rearview mirror
Over your shoulders
15. You want to turn left ahead. In the middle of the road there is a lane marked as shown. You must:
Turn from your current traffic lane after signaling
Merge completely into this lane before you make your left turn
Not enter this lane for any reason
16. When you park on a level road next to a curb:
Your wheels must be within 18 inches of the curb
Your front wheels must be turned towards the side of the road
You do not have to set your parking brake
17. Animals may be transported in the back of a pickup truck only if:
The sides of the truck bed are at least 18 inches high
They are properly secured
The tailgate of the truck is closed
18. Which of the following will help you to avoid being hit from behind?
Signaling at least 100 feet before turning
Decreasing your following distance
Quickly pumping your brakes just before turning
19. When changing lanes on a freeway, you should:
Signal for at least five seconds
Cross several lanes at a time to avoid slow downs
Avoid driving over broken white lines and lane markings
20. Tailgating other drivers (driving too close to their rear bumper):
Can frustrate other drivers and make them angry
Cannot result in a traffic citation
Reduces accidents by preventing you from being "cut off"
21. Driving faster than traffic and continually passing other cars:
Will get you to your destination much faster and safer
Increases your chances of an accident
Helps to prevent traffic congestion
22. You are driving defensively when you:
Always put one car length between you and the car ahead
Stare at the car in front of you while driving
Keep your eyes moving to look for possible hazards
23. Pedestrians crossing at corners have the right-of-way:
Only at controlled intersections
Only when a crosswalk is painted on the street
Whether or not a crosswalk is marked
24. When parking your vehicle on any hill:
One of your rear wheels should touch the curb
Use your parking brake and leave the vehicle in gear or park
Your front wheels should be parallel to the road if there is no curb
25. What is the difference between traffic lights with red arrows and those with solid red lights?
Red arrows are only used to stop traffic which is turning left
Red arrows are only used for protected turn lanes
You cannot turn against a red arrow, even if you stop first
26. Smoking inside a vehicle when a person younger than 18 years of age is present is:
Illegal at all times
Legal, if it is your child
Not restricted by law
27. Highways are typically most slippery:
During a heavy rainstorm in the middle of summer
When it first starts to rain after a dry spell
After it has been raining for a long time
28. This sign means:
You should slow down and move to the right lane
Stay in the right lane if you are driving slower than other traffic
Slower traffic must exit on the right
29. Which of these vehicles must stop before crossing railroad tracks?
Tank trucks marked with hazardous materials placards
Motor homes or pickup trucks towing a trailer
Sport utility vehicles carrying four or more persons
30. This sign means:
Road hazard to the right
Right turn permitted on green arrow only
Curve to the right
31. You are driving on a highway when a tire blows out on your vehicle. What should you do?
Don't apply the brake until the vehicle has almost stopped
Brake hard and steer to the right
Pump your brakes and slow to a stop on the roadway
32. You may drive in a bike lane:
During rush hour traffic if bicycles are not present
No more than 200 feet before making a right turn
Whenever bicyclists are not present
33. Do not start across an intersection if you know you will block the intersection:
Under any circumstances
Unless you entered the intersection on a green arrow
Unless you entered the intersection on a green light
34. You are driving on a road where the speed limit is 45 mph. All the other vehicles are driving 50 mph or faster. You may legally drive:
50 mph or faster. The speed of traffic
Anywhere between 45 mph and 50 mph
No faster than 45 mph
35. To turn right from a highway with two lanes in your direction, turn from:
The lane closest to the center of the road
The lane nearest the curb or edge of the roadway
Either lane, depending on oncoming traffic
36. Which of these statements about drugs and driving is true?
Any prescription drug is safe to use if you don't feel drowsy
Even over-the-counter drugs can impair your driving
Only illegal drugs can impair your driving
37. A traffic light is red, but a peace officer is signaling you to continue driving. What should you do?
Change lanes and drive slowly
Wait for the green light
Do as the officer tells you
38. A flashing red traffic light at an intersection means:
Slow down before entering
Stop before entering
Stop and wait for the green light
39. When planning to pass another vehicle you should:
Not assume they will make space for you to return to your lane
Assume they will let you pass if you use your turn signal
Assume they will maintain a constant speed
40. If you have trouble seeing other vehicles because of dust or smoke blowing across the roadway, you should drive slower and turn on your:
Interior lights
Parking lights
41. You must notify DMV within 5 days if you:
Sell or transfer your vehicle
Modify your vehicle's exhaust system
Paint your vehicle a different color
42. You are driving on a road with only one lane in each direction and you want to pass. There is a curve ahead which blocks your view. You must:
Not pass the other vehicle
Increase your speed to pass safely
Signal longer than five seconds to pass safely
43. Which all of the following are dangerous to do while driving, which is also illegal?
Listening to music through a set of dual headphones
Adjusting your outside mirrors
Reading a road map
44. You should use your horn when:
Another vehicle is in your way
It may help prevent an accident
Another driver makes a mistake
45. If your driving record shows you failed to appear in court after receiving a traffic ticket, DMV will:
Suspend the registration of the vehicle you are driving
Suspend your driving privilege until you appear in court
Restrict your driving privilege
46. You have had your license for three months. You may:
Drive between 5:00AM and 5:00PM unaccompanied
Transport minors unaccompanied at any time
Transport minors between 11:00PM and 5:00AM unaccompanied |
The short story “The Chrysanthemums” Essay Sample
The whole doc is available only for registered users OPEN DOC
Get Full Essay
Get Access
The short story “The Chrysanthemums” Essay Sample
When one considers a man from the 1900s, the word “feminist” hardly comes to mind. John Steinbeck, however, might be an exception. His short story “The Chrysanthemums” was published in 1938, during a time where a woman’s place in society was radically different than that of a man’s. The Depression cut down the newfound ‘feminism’ of the 1920s, and the flashy stereotype of the flapper girl began to disappear as more women had to go to work in terrible conditions where they were paid less. (Baughman) The 1930s were a time where oppression thrived, and women craving intellectual challenges and sexual freedom were smothered by domestic duties and societal expectations. This is clear in Steinbeck’s protagonist, Elisa Allen, a woman of depth and deep-rooted suffering. Elisa’s suffering stems from the limitations of her gender and how men perceive her versus how she defines her own femininity. In “The Chrysanthemums”, Steinbeck explores the frustration that comes from repression of female strength, intelligence, and sexuality.
Elisa Allen is a woman whose true potential is confined inside her unfulfilling life. From the beginning of the story, Steinbeck paints a stifling, gloomy world for Elisa through the description of her setting. The fog “closed off” the Salinas Valley from the sky, and “sat like a lid on the mountains”.
claustrophobic atmosphere for Elisa to live in. Much like the sky and the mountains, beautiful pieces of the natural world, Elisa herself is closed and trapped under the “lid” of her womanhood and the domestic lifestyle that comes with it. Steinbeck takes this domestic lifestyle and displays Elisa breaking some of the gender boundaries within it for herself. Elisa looks for work to do around the ranch, and finds there is not much left to do, indicating to the reader that she often tackles typical farmhand tasks such as moving bales of hay and plowing the field.
These activities require a level of strength that is most typically associated with men. Even Elisa’s physical description is filled with masculine features: a “lean and strong” face and a “blocked and heavy” figure. (Steinbeck, 1) The word “blocked” further evokes a sense of external confinement, mirroring the internal confinement Elisa’s gender costs her. Elisa’s clothing choices blurs the gender line even further. She wears “a man\’s black hat pulled low down over her eyes” and a dress “almost completely covered by a big corduroy apron”. (Steinbeck, 1) Masculine clothes, a symbol of the masculine view Elisa has of herself, block and cover Elisa’s femininity. The hat covers her eyes like a mask, symbolizing her use of her inherent masculinity as a cover for her underlying feminine strength. The apron, described as corduroy, a thick and tough material further symbolizing masculinity smothers her dress, a symbol of her feminine identity.
Steinbeck mirrors Elisa’s internal and external confinement through her working life as well. Elisa watches from behind a literal––and figurative–– fence as her husband and a couple of businessmen discuss ranch matters across the yard. Separated from these men and shut out from a conversation that pertains to her just as much as her husband, she is left to work on her garden.
the important business matters, while women like Elisa are left to their simple domestic hobbies. “Even her work with the scissors was over-eager, over-powerful. The chrysanthemum stems seemed too small and easy for her energy.” (Steinbeck, 2) While Elisa loves gardening and is passionate and knowledgable about her flowers, the task does not offer her a physical or intellectual challenge. With this quote, Steinbeck is further acknowledging that she has the potential for more than simple typically “female” tasks like gardening. Elisa remains “blocked” and heavy with her untapped intellectual and physical potential. Her work on the ranch and her uninteresting husband leave this potential untouched.
In contrast, Elisa’s encounter with the travelling tinker awakens her emotional and sexual potential. Steinbeck portrays the tinker through Elisa’s eyes as the peak of manliness. He is large, dirty, and has dark and brooding eyes, the same, to Elisa, as “teamsters and of sailors”, highly masculine positions. Nothing in Steinbeck’s description of the tinker’s physical appearance is necessarily handsome or appealing, but Elisa is nevertheless drawn to him in some visceral way. Elisa engages the tinker on a level that is intellectually equal to his, making jokes about his dogs “getting started” and even challenging his quality of work versus her own.
“You might be surprised to have a rival sometime. I can sharpen scissors too. And I can beat the dents out of little pots. I could show you what a woman might do.” (Steinbeck, 9) Elisa displays this confidence in her work and a competitive attitude, actions normally showcased by men, as another act of subtle rebellion. By challenging the tinker, Elisa is showcasing her strength and potential in ways she never does around her husband. This freeing action denied to women, being able to simply brag about herself, seems to loosen Elisa up more and more.
The tinker takes it further by mentioning the chrysanthemums, and Elisa lights up. The excitement of the tinker taking an interest in her work and passion relaxes her physically. “She tore off the battered hat and shook out her dark pretty hair.” (Steinbeck, 6) Elisa has removed her hat, a symbol of her mask of masculinity, and the release of her hair represents the release of her femininity as well, a contrast to the confinement of the beginning of the story. Elisa makes note that she would enjoy the tinker’s adventurous life; But the tinker shuts her down, claiming it isn’t the right type of life for a woman. As Elisa grows to admire and desire the tinker’s dangerous, rugged lifestyle more and more, her conversation with the tinker grows more passionate and sexual. This effect is mirrored by the way Elisa digs the stems from the soil, carefully yet with indulgence, using her bare hands. This interaction with the earthy soil, a symbol of nature, represents Elisa getting in touch with her natural womanhood and sensuality. As she does so, she finds she can take control more with the conversation.
The liberation of her instinctual feminine power creates feelings of sexual desire in Elisa, but these feelings are eventually repressed. She speaks romantically of her instinctual and natural talent with the chrysanthemum buds, and as she does so her posture changes to reflect her newfound feminine confidence. Her breast “swells passionately” in a way that makes the tinker self-conscious, and she enjoys this power over him, even feeling powerful enough to interrupt his next sentence with her voice described as “husky”. (Steinbeck, 8) Elisa goes so far as to attempt touching his pants, before receding back into an erotically submissive pose. Eventually, the tinker brings up that he hasn’t had dinner in order to manipulate Elisa into letting him do a job for her. Snapped out of her episode of power and sexual liberation,
Elisa returns to the stiff, confined body language she displays in the beginning of the story. Because of the way powerful female sexuality was looked down upon during the 1900s, Elisa feels “ashamed” about her small indulgence in the encounter with the tinker. She was not ‘supposed’ to be so bold and forward as she had been with him, and this social standard causes her the embarrassment she experiences and cuts her liberation short. Despite this, she is changed by the sexual and emotional interaction, and this is demonstrated by the bathing routine that happens in the story soon after the tinker leaves.
Elisa’s bathing and changing of herself demonstrates her eagerness to take charge of her own feminine power and sexuality. After the encounter with the tinker, she goes inside and runs a bath, scrubbing herself with a block of pumice on her “thighs, loins and chest and arms, until her skin was scratched and red.” (Steinbeck, 10) Although she had gotten dirt on her hands and face as well, Steinbeck only mentions the erotic places Elisa scrubs herself, including the fact that she is taking the time and care to scrub herself raw. This act is meant to symbolize frustration due to Elisa’s sexual repression. (Mitchell, 100)
Elisa also demonstrates a newfound interest and confidence in her physical appearance, posing in her mirror and looking at herself from different angles of strength, with her chest out and her stomach tightened. She then takes care to dress slowly and in her finest clothes, specifically “a dress which was the symbol of her prettiness.” This description is utilized by Steinbeck to represent Elisa’s knowledge that the dress makes her more “pretty”, more feminine, and more sexually appealing, which further displays the change she has undergone after the encounter with the tinker. She even takes consideration into her hair and makeup, hoping to possibly evoke a sexual response in her husband by taking control of her femininity as she did with the tinker.
She sits “primly and stiffly” while waiting for Henry, indicating the physical shift into a more ladylike figure. When Henry sees his wife, he is caught off guard by the care she has taken with her looks and also the manner with which she now carries herself. She replies with a challenging question when Henry says she looks “nice”, and replies with further confidence when his answer includes commenting on her looking “strong”. Henry, no doubt unused to seeing this confidence from his wife, cannot offer her a reply intellectually playful enough to please her. (Skredsvig)
Elisa’s story ends with a disappointment many women can identify with today. On the way into town, Elisa sees that her chrysanthemums have been discarded by the tinker, an act of disrespect and indifference.
Her beloved plants, a symbol of not only her hopes for her future but of her pride in her talent, are crushed. All of her newfound confidence, pride, and strength are thrown away, and she ends the story in resignation. “‘Oh, no. No. I don’t want to go. I’m sure I don’t.’ Her face was turned away from him. ‘It will be enough if we can have wine. It will be plenty.’” (Steinbeck, 13) Instead of challenging him or standing up for herself and her strength, she agrees with her husband’s characterization that women wouldn’t enjoy fights. The promise of alcohol is as adventurous as her night, and life, will be, and she convinces herself it will be enough. This indicates her final acceptance of her place in society. She has come to terms with the fact that she might be trapped as the rancher’s wife, stifled both physically and emotionally, forever.
The root of Elisa’s frustration stems from her inability to fit comfortably within the limitations that society has created for her. Steinbeck, clearly empathizing with the frustration powerful women face in overcoming the prejudices and stereotypes made about the female gender, treats the ending of the story with respect as the tragedy it is. Even more tragic is the story’s reflection of life today. Despite strides in the right direction, women are still being held back. Female doctors and surgeons, for example, earn 71 percent of what their male colleagues make. (Lipman) If placed in an atmosphere where she could grow, Elisa would thrive in more ways than as a gardener, and this is true of hundreds of thousands of women in the world. “The Chrysanthemums” illustrates why societal gender roles are harmful to the growth of human beings, highlighting how it creates an almost insurmountable barrier to things like a healthy sense of sexuality, self-confidence, and even skill level. The world must be made into a place of empowerment for women, not oppression.
We can write a custom essay
According to Your Specific Requirements
Order an essay
You May Also Find These Documents Helpful
The New Male Sexuality
Human sexual needs are a complex phenomenon. It is not just the combination of intercourse and foreplay; however, also other aspects of sexual behavior that constitute human sexuality. Social scientists and researchers have a deep interest in studying the very nature of human sexuality. Male sexuality, in particular, has been a topic of much debate and research. Why scientists are so interested in male sexuality?...
Sexuality In The Nineteenth Century
There has been a long-drawn-out debate on whether or not sexuality in the nineteenth century was reserved or open. In the United States, sexuality in the nineteenth century was truly reserved. First of all, birth rates were not high among white women. Usually, the frequency of sex increased the likelihood of pregnancy. Most married couples avoided sexual intercourse to decrease the frequency of childbirth. As...
Media, Peers, Church & Parents Influence On...
Introduction In this paper, we try to assess the causes and effects of media, peers, church and parents on teenage sexuality, especially with regard to USA, which has the highest rate of teenage sexual activity in the world, and the different approaches used to tackle the issue and their effectiveness in reaching the goal of reducing teen sexual activity. One certain conclusion to be drawn...
Sexuality Case Study
Sexuality is an instinct imprinted into the genes of each living creature. Attraction to the opposite sex has been the key factor behind reproduction and survival of each species. Most of the species are born with only seasonal sexual necessities. They mate and reproduce only at limited times a year. Human beings, on the other hand, have active sexual instincts throughout his/her life; right from...
Sex Education
Human sexuality has biological, emotional/physical and spiritual aspects. The biological aspect of sexuality refers to the reproductive mechanism as well as the basic biological drive, Libido that exists in all species, which is hormonally controlled. The emotional or physical aspect of sexuality refers to the bond that exists between individuals, and is expressed through profound feelings or physical manifestations of emotions of love, trust, and...
Get Access To The Full Essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well
Your Answer Is Very Helpful For Us
Thank You A Lot!
Emma Taylor
Hi there!
Would you like to get such a paper?
How about getting a customized one? |
Explore BrainMass
This problem deals with the estimation of average variable costs and average total costs, given two hypothetical and different fixed costs for a single firm. Comparing the two cost estimations, this problem then estimates optimal employment levels for short-run productivity to determine how many employees must be laid off in order for the firm to break even and whether remaining employees can increase production levels so as to maintain current output levels for the firm.
The firm currently uses 50,000 workers to produce 200,000 units of output per day. The daily wage per worker is $80, and the price of the firm's output is $25. The cost of other variable inputs is $400,000 per day. Although you do not know the firm's fixed cost, you know that it is high enough that the firm's total costs exceed
Macroeconomics Questions
1. What is a government budget deficit? How does a federal budget deficit affect the economy? How does it affect the level of investment and interest rates? How does it affect the individual consumer? Give at least three examples in your response. 2. Are unions good or bad for the economy? How do unions at GM and Ford affect
Suppose that you are the chief economic advisor to the president of the U.S. You are asked to propose a strategy to bring the economy out of recession. Your goal is to avoid inflation and yet bring the economy to full employment as rapidly as possible. What will be your main strategy? Why? Use examples and give reasons to suppor
Equilibrium Income Calculations
1. Suppose that initially equilibrium was 200 units and that this was also full employment level of income. Assume the consumption is C = 25 + 0.8YD, and that, from this level, we now have a decline in investment of 8 units. What will be the new level of income? What increase in government spending would be needed to restore
Sexual Issues & Discrimination
As the new human resources [HR] manager you should now create portions that specifically address gender issues and are targeted at training and raising the sensitivity of all employees to potential gender issues. It should include a section on how the supervisor should or should not handle certain gender-based workplace issues.
Government spending in the United States is expected to increase
According to the newspaper government spending in the United States is expected to increase by $30 billion next year. One of the senators of your state is touting how this increase in spending will lead to an increase in employment and aggregate output. The economy is currently in long-run equilibrium at the natural ra
Discussing Government Budget Deficit & Unions
Managerial Economics
The factors that affect the demand for new passenger cars in the U.S. are given; From these data answer the following questions. 1. Estimate the demand equation for new cars of the form Y = a +b1X1 + b2X2 + b3X3+b4X4 2. With the use of a graph, compare the estimated demand Y' based on the above equation with
Translate your ideas into economic analysis using the specific economic theory and economic terms Why is frictional unemployment important to have in any economy? Explain why hyperinflation has such a devastating impact on economies. Explain what it takes to stop hyperinflation. Describe the three types of unemploymen
Describe the relationship between each of the following variables based on the experience of the U.S. economy over the past 30 years. (a) GDP and the unemployment rate (b) The interest rate and the inflation rate (c) GDP and the inflation rate
1.Assuming the level of investment is $16 billion and independent of the level of total output,complete the accompanying table and determine the equilibrium levels of output and employment in this private closed economy. What are the sizes of the MPC and MPS? Possible Levels Real Domestic Consumption, Saving
AD-AS and IS-LM question & diagram
"An increase in transfers (TR) will not affect the level of real GDP or the real money supply in a fully employed economy." **Comment on this statement with the help of (1) an AD-AS diagram (using a long-run aggregate supply curve for this fully-employed economy operating at potential) and (2) an IS-LM diagram.
Unemployment Rate
What measures the fed should take to reduce the unemployment rate and expand the economy. Remember that the answer has to deal with monetary policy, so don't talk about taxes nor government's spending because these deal with fiscal policy.
Theory & estimation of Production
Hi, Having difficulites solving the following problems, can someone give me some clues? Thanks. Number Of Workers Output 0 0 1 50 2 110 3 300 4 450 5 590 6 665 7 700 8 725 9 710 10 705 1) The table above shows the weekly relationship between output and number of workers for a factory with a fixed size of p
Key Objectives and Q&A?
Visit the home page of the Federal Reserve Systems of the central bank of US at www.federalreserve.gov and read the key objectives of the Fed to stabilize the macroeconomic crises of the US economy. Based on the information on monetary policy objectives and tools, answer the following question A. A) What are those key objecti
Discussion on Tax Incidence
Stuck on two questions, need at least 2 to 3 paragraphs for each answer. 1.Ultimately who will pay the cost? Look up tax incidence on Wikipedia. 2. Can other externalities be dealt with similarly? See the attached file.
Net and cost revenue
As vice president of sales for a rapidly growing company, you are grappling with the question of expanding the size of your direct sales force (from its current level of 60 national salespeople). You are considering hiring from 5 to 10 additional personnel. How would you estimate the additional dollar cost of each additional sal
Average Wages in the U.S. Exportable Sector
3. Use the Heckscher-Ohlin/factor proportions framework with two factors, skilled and unskilled labor, to evaluate the following arguments. Suppose X is more skill intensive than Y. Suppose the US is more skill abundant than the rest of the world. Explain your answer. a) Average wages are higher in the US exportable sector.
The Economic Status of Chemistry
Answer the following questions on the economic status of chemists. the answers may be found in the chemistry and engineering news issues of june 2, 2008(questions1-8) and march 9, 2009(questions 9-10) http://pubs.acs.org/cen/archive/back.html look under ACS news (2008 issue) or salary survey (2009 issue) and be sure to check
Thr federal Reserve
Please provide original work to meet the attached requirement concerning the federal reserve.
Keynesian cross diagram
Question 2 Suppose that initially the goods and services market is in equilibrium at the potential (full-employment level) of output and that the government budget is balanced, that, is government spending equals tax revenues. a. Now suppose that because of headwinds from a credit crunch, consumption and investment fall. A
Gross Domestic Product and Recession
What is "Gross Domestic Product" (GDP), and how is it determined each month? What does the term "Recession" mean and how do we know when one occurs? How does government intervene to move the economy out of a recession?
1) Assume that in Canada the opportunity cost of producing 2 television sets is 3 bushels of wheat. Assume that in the U.S. the opportunity cost of producing 2 bushels of wheat is 3 television sets. If these two countries specialize according to comparative advantage and then trade with one another, then __________. a. Canada
Federal Reserve Monetary Policy
I need a little guidance to help me get started on this assignment. Write a 700-1050 word paper on the U.S. Federal Reserve's monetary policy o Define the purpose and function of money o Explain how the central bank manages a nation's monetary system. o Outline the stated direction of recent monetary policy in the |
Absolute Value Equations #2
Algebra Level 4
Given that the sum of all possible values of \(x\) that satisfy the equation
\[\large |3x-2|-|x+1|=x+2\]
can be expressed in the form \(\dfrac{m}{n}\), where \(m\) and \(n\) are coprime positive integers, find the value of \(m+n\).
This problem is part of the set Absolute Value Equations.
Problem Loading...
Note Loading...
Set Loading... |
Technological Knowledge
A fourth determinant of productivity is technological knowledge the understanding of the best ways to produce goods and services. A hundred years ago, most Americans worked on farms because farm technology required a high input of labor to feed entire population Today, thanks to advances in the technology of farming, a small fraction of the population can produce enough food to feed the entire country. This technological change made labor available to produce other goods and service Technological knowledge takes many forms. Some technology is common knowledge-after one person uses it, everyone becomes aware of it. For example, once Henry Ford successfully introduced production in assembly lines, other car makers quickly followed suit. Other technology is proprietary-it is known only by the company that discovers it. Only the Coca-Cola Company, for instance, knows the secret recipe for making its famous soft drink. Still other technology is proprietary for a short time. When a pharmaceutical company discovers a new drug, the patent system gives that company a temporary right to be its exclusive manufacturer. When the patent expires, however, other companies are allowed to make the drug All these forms of technological knowledge are important for the economy’s production of goods and services It is worthwhile to distinguish between technological knowledge and human capital Although they are closely related, there is an important difference. Technological knowledge refers to society’s understanding about how the world works. Human capital refers to the resources expended transmitting this understanding to the labor force. To use a relevant metaphor, knowledge is the quality of society’s textbooks, whereas human capital is the amount of time that the population has devoted to reading them Workers’ productivity depends on both.
Share This |
Page semi-protected
Solar time
From Wikipedia, the free encyclopedia
(Redirected from Mean solar day)
Jump to navigation Jump to search
Solar time is a calculation of the passage of time based on the position of the Sun in the sky. The fundamental unit of solar time is the day. Two types of solar time are apparent solar time (sundial time) and mean solar time (clock time).
A tall pole vertically fixed in the ground casts a shadow on any sunny day. At one moment during the day, the shadow will point exactly north or south (or disappear when and if the Sun moves directly overhead). That instant is local apparent noon, or 12:00 local apparent time. About 24 hours later the shadow will again point north/south, the Sun seeming to have covered a 360-degree arc around the Earth's axis. When the Sun has covered exactly 15 degrees (1/24 of a circle, both angles being measured in a plane perpendicular to the Earth's axis), local apparent time is 13:00 exactly; after 15 more degrees it will be 14:00 exactly.
Apparent solar time
Length of apparent solar day (1998)[9]
Date Duration in mean solar time
February 11 24 hours
March 26 24 hours − 18.1 seconds
May 14 24 hours
June 19 24 hours + 13.1 seconds
July 25/26 24 hours
September 16 24 hours − 21.3 seconds
November 2/3 24 hours
December 22 24 hours + 29.9 seconds
Mean solar time
Mean solar time is the hour angle of the mean Sun plus 12 hours. This 12 hour offset comes from the decision to make each day start at midnight for civil purposes whereas the hour angle or the mean sun is measured from the zenith (noon).[10] Currently (2009) this is realized with the UT1 time scale, constructed mathematically from very long baseline interferometry observations of the diurnal motions of radio sources located in other galaxies, and other observations.[11][12] The duration of daylight varies during the year but the length of a mean solar day is nearly constant, unlike that of an apparent solar day.[13] An apparent solar day can be 20 seconds shorter or 30 seconds longer than a mean solar day.[9][14] Long or short days occur in succession, so the difference builds up until mean time is ahead of apparent time by about 14 minutes near February 6 and behind apparent time by about 16 minutes near November 3. The equation of time is this difference, which is cyclical and does not accumulate from year to year.
Mean time follows the mean sun. Jean Meeus describes the mean sun as follows:
See also
1. ^ Astronomical Almanac Online. Archived 2015-11-08 at the Wayback Machine. (2011) Her Majesty's Nautical Almanac Office and the United States Naval Observatory. Glossary s.v. solar time.
2. ^ Leap Seconds. Archived 2015-03-12 at the Wayback Machine. (1999). Time Service Department, United States Naval Observatory.
3. ^ For the three kinds of time, see (for example) the explanatory section in the almanac Connaissance des Temps for 1902, page 759 Archived 2011-08-10 at the Wayback Machine..
4. ^ Celestial Mechanics Chapter 6 Archived 2015-09-23 at the Wayback Machine., J.B. Tatum, University of Victoria
5. ^ Astronomical Almanac Online Archived 2008-09-14 at the Wayback Machine. (2010). United States Naval Observatory. s.v. solar time, apparent; diurnal motion; apparent place.
6. ^ Yallop, B. D. and Hohenkerk, C. Y. (August 1989). Solar Location Diagram Archived 2010-12-24 at the Wayback Machine. (Astronomical Information Sheet No. 58). HM Nautical Almanac Office.
7. ^ Allison, Michael; Schmunk, Robert (30 June 2015). "Technical Notes on Mars Solar Time as Adopted by the Mars24 Sunclock". Goddard Institute for Space Studies. National Aeronautics and Space Administration. Archived from the original on 25 September 2015. Retrieved 8 October 2015.
8. ^ Allison, Michael; McEwen, Megan (2000). "A post-Pathfinder evaluation of areocentric solar coordinates with improved timing recipes for Mars seasonal/diurnal climate studies". Planetary and Space Science. 48 (2–3): 215. Bibcode:2000P&SS...48..215A. doi:10.1016/S0032-0633(99)00092-6. Archived from the original on 2015-06-23.
10. ^ "Archived copy" (PDF). Archived (PDF) from the original on 2018-03-28. Retrieved 2018-03-28.
14. ^ "The duration of the true solar day" Archived 2009-08-26 at the Wayback Machine.. Pierpaolo Ricci. (Italy)
16. ^ :(1) In "The Physical Basis of the Leap Second", by D D McCarthy, C Hackman and R A Nelson, in Astronomical Journal, vol.136 (2008), pages 1906-1908, it is stated (page 1908), that "the SI second is equivalent to an older measure of the second of UT1, which was too small to start with and further, as the duration of the UT1 second increases, the discrepancy widens." :(2) In the late 1950s, the cesium standard was used to measure both the current mean length of the second of mean solar time (UT2) (result: 9192631830 cycles) and also the second of ephemeris time (ET) (result:9192631770 ± 20 cycles), see "Time Scales", by L. Essen Archived 2008-10-19 at the Wayback Machine., in Metrologia, vol.4 (1968), pp.161-165, on p.162. As is well known, the 9192631770 figure was chosen for the SI second. L Essen in the same 1968 article (p.162) stated that this "seemed reasonable in view of the variations in UT2".
External links |
King Lear is a perfect demonstration of the great consequences one man? s actions can cause. While there are certainly religious Christian elements to the story, the story is not one of morality or hope. King Lear is a lesson, making an example of what can come of a single, foolish, egotistical action. King Lear? s action is the surrendering of his throne to his daughters. The element of Christianity enters here, because King is a God-appointed position, not to be given up. Lear, however, decides to disregard this fact, instead focusing on the immediate gratification he will receive from his daughters, and boosting his self-esteem while making him feel loved.
Lear essentially offers his land and power for love, ? Which of you shall we say doth love us most? That we our largest bounty may extend where nature doth with merit challenge, ? forgoing his God-given position and rights. Next enters the punishment, seemingly brought about by God. Because Lear has disregarded God? s wishes, he is made to suffer insanity and excruciating physical torment. Lear is even given multiple opportunities to revoke his decision, but rather than heed the advice of those trying to help him, he banishes them for questioning his selfish decision. This leaves Lear surrounded by the people looking only to better themselves by using the now vulnerable Lear. Lear is estranged from his kingdom and friends, causing his loss of sanity.
In the midst of Lear? s self-pity he is discovered by the fool. Fittingly enough the fool is the one able to lead Lear back to the normal world. He is made to appreciate the people who truly cared about him from the beginning. He sees that they were right all along, and repents from his foolish decision, though it? s too late to do him any good.
Once more, the consequences of Lear? s single sin are felt. In a typically Christian or hopeful ending, King Lear would learn to listen to the caring friends he has, and become less selfish. Shakespeare, however, chooses not to end it so predictably or simply. Even after all of Lear? s suffering and repenting, he continues to receive punishment. Cordelia, who he has now realized truly loved him most, is killed. Lear is left feeling hopeless, saying, ? I know when one is dead, and when one lives.
She? s dead as earth, ? which seems slightly to refer to his now cynical view of the earth. In the end, all of Lear? s suffering can be traced back to his first and biggest mistake in the play. He is forced to live with this mistake to the bitter end, in this case, the end of his life. Lear is? old now, and these same crosses spoil (him). ? After having gone through the worst, it becomes obvious to the reader that Lear has come to an understanding with God, in this instance the personification of religion. This provides not hope for the reader, but rather teaching.. |
Inbreeding`s Ins-And-Outs
July 13, 2011, 05:42 AM
Print Friendly and PDF
Now that a man can marry a man, schismatic Mormons are asking: why can't a man marry two women? And Muslims are asking: why can't can't a man marry his first cousin? And Hindus from southern India are asking: why can't a man marry his niece?
In-breeding appealed to political and economic dynasts, such as the Habsburgs and Rothschilds, because it doesn't dissipate family assets to too many heirs.
The Habsburg dynasty that reigned over much of Europe from the late medieval period to the last days of WWI is notorious today for the inbreeding that beset Charles II, the Habsburg king of Spain from 1665-1700. Wikipedia explains:
Charles was born in Madrid, the only surviving son of his predecessor, King Philip IV of Spain and his second Queen (and niece), Mariana of Austria, another Habsburg. His birth was greeted with joy by the Spanish, who feared the disputed succession which could have ensued if Philip IV had left no male heir.
17th century European noble culture commonly matched cousin to first cousin and uncle to niece, to preserve a prosperous family's properties. Charles's own immediate pedigree was exceptionally populated with nieces giving birth to children of their uncles: Charles's mother was a niece of Charles's father, being a daughter of Maria Anna of Spain (1606–46) and Emperor Ferdinand III. Thus, Empress Maria Anna was simultaneously his aunt and grandmother and Margarita of Austria was both his grandmother and great-grandmother.[1] This inbreeding had given many in the family hereditary weaknesses. That Habsburg generation was more prone to still-births than were peasants in Spanish villages.[2]
There was also insanity in Charles's family; his great-great-great(-great-great, depending along which lineage one counts) grandmother, Joanna of Castile ("Joanna the Mad"; however, the degree to which her "madness" was induced by circumstances of her confinement and political intrigues targeting her is debated), mother of the Spanish King Charles I (who was also Holy Roman Emperor Charles V) became insane early in life. Joanna was two of Charles' 16 great-great-great-grandmothers, six of his 32 great-great-great-great-grandmothers, and six of his 64 great-great-great-great-great-grandmothers.
(Here's my my movie review of the Spanish biopic Juana la Loca.)
Dating to approximately the year 1550, outbreeding in Charles II's lineage had ceased (see also pedigree collapse). From then on, all his ancestors were in one way or another descendants of Joanna the Mad and Philip I of Castile, and among these just the royal houses of Spain, Austria and Bavaria. Charles II's genome was actually more homozygous than that of an average child whose parents are siblings.[2] He was born physically and mentally disabled, and disfigured. Possibly through affliction with mandibular prognathism, he was unable to chew. His tongue was so large that his speech could barely be understood, and he frequently drooled. It has been suggested that he suffered from the endocrine disease acromegaly,[3] or his inbred lineage may have led to a combination of rare genetic disorders such as combined pituitary hormone deficiency and distal renal tubular acidosis.[2]
Consequently, Charles II is known in Spanish history as El Hechizado ("The Hexed") from the popular belief – to which Charles himself subscribed – that his physical and mental disabilities were caused by "sorcery." The king went so far as to be exorcised.
Charles II died without issue at age 38, which set off a crisis in Europe's balance of power. His will named as king of Spain a relative who was also the grandson of King Louis XIV of France. Britain objected to the union of France and Spain under the Bourbons. In the ensuing War of the Spanish Succession, John Churchill became Duke of Marlborough for winning the Battle of Blenheim. (His descendant Winston Churchill wrote a six volume biography of his ancestor.)
So, the Habsburgs were genetically doomed forever by inbreeding, right?
Well, on July 4, 2011 died Franz Joseph Otto Robert Maria Anton Karl Max Heinrich Sixtus Xavier Felix Renatus Ludwig Gaetan Pius Ignatius von Habsburg , crown prince of the Austro-Hungarian Empire from 1916-18, who lived a model of a healthy, useful life, died at age 98. He stood against Hitler and Stalin, turned down the throne of Spain and recommended Juan Carlos instead, and served in the European Union parliament for decades. Otto von Habsburg was, by political inclination, ancestry, and family trade, a pan-Europeanist. His ancestor Charles V had ruled over more of Europe (and ruled rather conscientiously) than any man between Charlemagne and Napoleon.
Otto von Habsburg's last great contribution to European unity was cosponsoring the Pan-European Picnic on August 19, 1989 on the Austrian-Hungarian border, where the Soviet Empire sprang a terminal leak. By pre-arrangement with Hungarian authorities, the border gate in what we call "the Berlin Wall" (but which was actually 1800 miles long, running from the Baltic to the Aegean) was opened for three hours during Otto's picnic. Hundreds of East German tourists left the Warsaw Pact countries to join relatives in West Germany.
A few weeks after this genial occasion, the Hungarians decided to make it permanent and stopped stopping East Germans tourists from leaving Hungary for the West. Because there was no serious border control within the Warsaw Pact, a leak anywhere could eventually drain the Soviet Empire of its most valuable inmates. Eventually, the East Berlin authorities gave in on November 9, 1989 and told the wall guards to stop guarding.
Archduke von Habsburg was also a pundit whom I regularly read forty years ago. Charles A. Coulombe writes in Taki's Magazine in Death of an Imperial Pen Pal:
The San Fernando Valley in the 1970s was a very dull place. Hot and dusty, filled with lackluster architectural construction thrown together during the postwar housing boom, it was the last place I wanted to be.
Back in those far-off days, the LA Archdiocese’s paper, The Tidings, ran a column by the Archduke Otto von Habsburg, son of Austria-Hungary’s last Emperor-King.
I read him, too. The Tidings' other columnist back when I was 12 was the almost as cosmopolitan Erik von Kuehnelt-Leddihn. We got a quality dose of high-brow Mittel-Europa punditry in the San Fernando Valley
The solution to the genetic woes of inbreeding is to stop inbreeding. Even a modest level of non-inbreeding quickly solves problems like sterility.
From Catholic News:
Otto, who stopped appearing in public after the death of his wife, Regina, last year, is survived by his younger brother, Felix, as well as 7 children, 22 grandchildren and 2 great-grandchildren.
You can do some interesting calculations about average fertility per generation using the last paragraph in the obituaries of prominent people (although one caveat is that the obituaries give survivors, not total descendants). It would be interesting to build a model to predict the number of surviving descendants by generation of, say, people important enough to get their obituaries in the New York Times. Use as factors: date of birth, age at death, sex, career, number of marriages, etc.
Take the Archduke as an example. So, among his survivors, Otto had 7 children and an average of 3.14 surviving grandchildren per surviving child. But his 22 grandchildren have only 2 surviving great-grandchildren, so far, or 0.09 on average.
Talk about pedigree collapse. |
64 642
Assignments Done
Successfully Done
In September 2018
Answer to Question #19273 in Physical Chemistry for naeim vhora
Question #19273
what is racemization?
Expert's answer
Racemization is the process in which one enantiomer of a compound, such asan L-amino acid, converts to the other enantiomer. The compound then alternates between each form while the ratio between the (+) and (–) groups approaches 1:1, at which point it becomes optically inactive. Since (+) and (–) are experimental parameters, the absolute configuration of atoms in chiral molecules are commonly described using R and S, from the Latin rectus (right-handed) and sinistrus (left-handed). An older convention, commonly used by biochemists to describe amino acids and sugars, uses the letters D and L to designate absolute configuration.
Need a fast expert's response?
Submit order
and get a quick answer at the best price
for any assignment or question with DETAILED EXPLANATIONS!
No comments. Be first!
Leave a comment
Ask Your question
Privacy policy Terms and Conditions |
Anger: Use it or Lose it?
Anger is the most unknown emotion.
Anger is “an emotional state that varies in intensity from mild irritation to intense fury and rage,” according to Charles Spielberger, Ph.D., a psychologist who specializes in the study of anger. Everyone experiences anger in a different way, but most of the time, anger is released with aggression. This aggression can save us in a survival situation, but not in society. Just like with many things, a little of anger is good and a lot can be destructive.
Suppression is one way to manage your anger. Suppression might sound like a bad thing, but it’s a good temporary fix. Sometimes, I find myself holding in so much anger that I become angry with myself, which is exactly what not to do. When you suppress your anger, you need to stop thinking about what makes you angry and put your mind to something else. Meditation, reading, and games are all good distractions. Eventually, suppression can become very difficult and can lead to things like depression and passive-aggressive behavior.
Expression is key in managing your anger. No, I don’t want you to start punching things and saying Beacon said you could. No, expression can be done in a mindful way. Sometimes, it’s okay to be assertive and speak up for yourself. Expressing your needs is important in getting whatever is it off your chest. Expression keeps your mind from thinking about something too much. It can keep you mentally healthy and prevent depression. When you feel like you’re about uncontrollably express your anger, it is so important to try to stay calm.
Staying calm is important in all situations. When you feel like you’re about to break down, whether it be from anger or sadness, staying calm can help you and everyone around you. There are so many ways to stay calm, but again, meditation is so helpful. Meditation clears your mind of everything and gets your focus back to what is important: you.
Shine Bright!!!
Info source:
Photo by Tomasz Sroka on Unsplash |
Proverbs 8 - Key
We should seek wisdom early. There's a promise, that if we do, we'll be rewarded by finding it.
The way to listen to wisdom and instruction is to spend time with the Lord every day, reading and studying the Word. If we do that, it's worthwhile, and it's promised that we'll be blessed.
I'll keep working on seeking wisdom early, and daily, in the Word.
Proverbs 8 - Outline
wisdom is widely available
v4 & 5
wisdom is for men, and for people who lack it
if a message is wisdom, no part of it will be wicked or perverted
v10, 11 & 19
wisdom is better than gold, silver, rubies, and every other desirable thing
the definition of wisdom
v15 & 16
it is by wisdom that kings, princes, nobles, and judges-- reign, rule, and decree justice
many great benefits of wisdom
wisdom was with the Lord in the beginning and in the creation
seeking wisdom is life, but refusing it is death
Answers on health
Question: Is it important to eat healthy food, since God knows when we're going to die anyway? :-D
So the topic is health and nutrition. The Bible teaches 2 things that I'd like to point out about that. Then I'd like to say a third thing.
1. We do, usually, have a responsibility to maintain our health
Ephesian 5:28 & 29
We should take a reasonable amount of care of our own physical wellbeing.
Proverbs 12:27
The slothful [man] roasteth not that which he took in hunting: but the substance of a diligent man [is] precious.
Proverbs 19:24
A slothful [man] hideth his hand in [his] bosom, and will not so much as bring it to his mouth again.
So it's lazy to not get proper nutrition
Proverbs 25:16
We shouldn't be gluttons, loving food, and eating too much, especially too much of certain kinds.
2. The kind of food we eat shouldn't be too important to us
Hebrews 13:9
Be not carried about with divers and strange doctrines. For [it is] a good thing that the heart be established with grace; not with meats, which have not profited them that have been occupied therein.
We shouldn't get carried away about health food. Also, it's not intrinsically a spiritual subject or a matter of doctrine. That's what the Bible teaches about it, now I'd like to say something I think about the subject.
3. Some "alternative" methods for wellness are dangerous
This is not necessarily something that I've seen that the Bible teaches, but this is what I think about "alternative" methods for wellness.
1. The type of food people eat doesn't make that much difference: See
Mark 7:18-23
2. Medical advice and science are generally good and helpful
Proverbs 11:14
Where no counsel [is], the people fall: but in the multitude of counsellors [there is] safety.
Philippians 4:8b
...whatsoever things [are] of good report...
What does science mean? Evolution is not scientific. If something is scientific, that means it has been thoroughly studied, tested, and documented by many smart people. How can that be a bad thing?
Daniel 12:4
3. Deceit in one area spreads to others: See
1 Timothy 4:1-11
seeing stupid sin & fearing to do the same
Mark 15
I was thinking about how the people who mistreated the Lord, mocking Him before He was crucified, were so stupid. Then I realized how easy it would be for me to fall into the same kind of sin. They could have argued that they thought they were doing what was right. They didn't fully realize that what they were doing was against the Lord, they thought it was just against this person, Jesus.
We should fear the Lord so that we never fall into such foolish sin. We should realize in our interactions with other people, if we do harmful things to them, that's just the same as if we were doing them to the Lord. Ultimately, all of our sin is against Him.
Genesis 22 - Key
What was it that Abraham's willingness to sacrifice Isaac showed? It showed that he feared God, and we should fear the Lord the same way.
We've seen a pattern of this behavior so many times. Because Abraham feared the Lord, he rose up early in the morning. For my application, I'll do the same.
Genesis 22 - Outline
Abraham's obedience
Abraham's faith
v9 & 10
Abraham's sacrifice
the Lord's sacrifice
in blessing I will bless thee... because thou hast obeyed my voice
Abraham heard about his nephews who were born, and Rebekah
accept His will
Mark 14
Jesus knew what it was like to not have what He asked for when He prayed, and He prayed for it three times. It's a good thing for us that He said, not what I will, but what thou wilt.
When we pray for what we want, let's make sure we're willing to accept whatever the Lord's will is. Don't be too surprised and disappointed if you say, Your will be done, and you don't get what you want.
"Take ye heed, watch and pray"
Lest coming suddenly he find you sleeping.
We should be aware of the Lord's return and of the end. We shouldn't be lazy or doing the wrong thing, like "sleeping" instead of watching.
Proverbs 7 - Key
I saw from this that we should listen to our parents. It's often difficult for children to listen to their parents, but they are parents, and their instructions are necessary to protect their children.
I'll work on listening to my parents, even if it's difficult.
Proverbs 7 - Outline
The Nature of Temptation
the way to avoid temptation: the Lord's commandments, wisdom, and understanding
the nature of a tempting situation: just getting nearby sin, in the darkness
the nature of a tempting person: loud and stubborn
the nature of tempting speech: fair and flattering
the wages of sin is death
Question #2: The Definition of Salvation
Isaiah 43:11
Who is the author of our salvation? We cannot save ourselves. The Lord is our only Savior.
Romans 10:4
This part of Romans 10 is talking about being saved. We can't be saved by keeping the 10 commandments, or any of the rest of the law. Those things are over with as far as believers are concerned. Christ Himself is the point now. The point is not to do something to be saved, but to believe on Him.
What is the application of this discussion? -- In other words, what can we practically do about in our own day-to-day lives? Three things:
1. believe the message to be saved,
2. keep believing the same message we were saved by, to walk with the Lord, and,
3. preach it to others so they can be saved and walk with the Lord, too
Romans 10:8
So what is this message? Is it something we can do with our hands, by reaching out and taking action, or something we can do with our feet by getting somewhere great? No, it's something we do only with our heart and with our mouth, to believe on the Lord and to call on Him. That is the word of faith, which we preach.
Titus 3:3-5
He saved us. We didn't save ourselves. It was when we were full of sin that He saved us according to His mercy.
Romans 5:6-8
It was not because we expressed sorrow for our sins, stopped sinning, or made Him into the Lord of every area our lives, because it was Not by works of righteousness which we have done (Titus 3:5). Titus 3:8 does say to affirm that they which have believed in God might be careful to maintain good works, but it doesn't say that we are saved by those works, it says that they which have believed in God might be careful to maintain good works. So those things are good, but it isn't by those things that we're saved.
Genesis 21 - Key
It's encouraging to remember that when we're in trouble, the Lord hears us and helps us.
What aileth thee... fear not; for God hath heard...
Instead of being upset, I'll leave it up to the Lord to do his part of dealing with things that trouble me, and I'll work on my responsibility of just trusting Him.
Genesis 21 - Outline
"the LORD did unto Sarah as he had spoken"
"Cast out this bondwoman and her son"
"God heard the voice of the lad"
Abimelech realized that the Lord was with Abraham, so he made a deal with him
Abimelech took care of his problem when he found out about it
v31 & 32
the covenant of Beersheba
v33 & 34
once again, Abraham called on the name of the Lord
Review: Question #1, What is the gospel?
(This article is taken from previous findmercy.com articles on this topic.)
getting things inside out
Matthew 23
This is a classic problem among people trying to be religious: fasting, getting baptized, trying to get into a better situation in this world. People try to make themselves right by making things seem right on the outside, or on the outward appearance of things.
Many people even have this problem in the question of salvation and the salvation message. The popular gospel is that, People could have been saved if they kept the 10 commandments, and that Now people can be saved by believing and repenting from their sin (and sometimes making Jesus the Lord of their life,) but not just by believing. True belief, The New Gospel says, not only results in a change of action, but consists of a change in action on the part of the saved.
That false gospel is a gospel of salvation by works, because turning away from doing sin, improving one's outward actions, and making the Lord into the master of every area of one's life is good works.
The unpopular, age-old, true gospel, says, that being saved is not by anything good that we can do, but only by belief in our hearts in the Lord Jesus Christ, and the free gift of the good things that He has done for us. We need to stop trying to make ourselves right by improving the outward appearance of our lives, and do things the right way. Have an honest change in the thoughts and intentions of our hearts, a change in what we believe and what we desire. Inner change will naturally translate into outward improvement, not the other way around.
repentance should be preached
Luke 24:36-53 (again)
This teaches that repentance is one of the things that we're supposed to preach in Jesus' name... But repentance in what way?
I think that we should preach for people who don't know Jesus to repent in their hearts from their unbelief, so they can be saved by believing in the Lord Jesus Christ. I think we should preach for believers to turn from what unbelief in Him they might still have. I also think we should preach for believers to repent from wrong-doing, so they can walk with the Lord in a way that's worthy of the salvation we've received.
Of course, it would be great if people who don't know Jesus would turn from sin too. However, telling unbelievers to stop sinning is not the gospel. We can't really stop without His help. Even if we could, it wouldn't do us any good because we can't save ourselves. The most important thing we need is to believe in Him. Only by believing in Him can we be saved in the first place, and only by believing in Him can we really repent from our sins.
the outside vs. the heart
Mark 12
(about the scribes:)
We should be right in our hearts, not just on the outside, like these scribes, because the Lord sees and judges the heart.
pray in faith
Mark 11
This just reminds me to pray in faith.
Proverbs 6 - Key
It just seems like the Lord has been wanting to talk to me about not being a sluggard.
v7 & 8
Which having no guide, overseer, or ruler,
While I'm doing self-paced work instead of having someone else make me do certain things at certain times, I need to be setting up my own schedule structure to get the right things done at the right time. I'll work on that.
Proverbs 6 - Outline
make sure of thy friend
sluggards think a little bit of sleep would be inconsequential
the pattern of a wicked man, spreading discord to others
the things the Lord hates
reproofs of instruction [are] the way of life
he who commits adultery with a woman destroys his own soul
humbly serve
Mark 10
If you want to be great, you have to be humble. We should be open to opportunities to humbly serve.
Genesis 20 - Key
It was encouraging to me that when Abimelech was doing his best to do what's right, the Lord saw that and honored it. The Lord didn't cause him to be tripped up into doing something wrong when he was trying to do right. In fact, He said, I also withheld thee from sinning against me.
2 Peter 1:3
The Lord has provided in every way for us to live godly. We don't always have to worry about having some accidental sin we're not aware of. As long as we're doing our best to act in the integrity of our hearts and innocence of our hands, the Lord will honor that and show us what He needs to show us, like He did with Abimelech.
I'll stop worrying about sins I might have but can't find out, and I'll start resting and rejoicing in the reality that my sins are forgiven.
Genesis 20 - Outline
God kept Abimelech from sinning because God knew that he was righteous
Abimelech and his men had more fear of God than Abraham thought
v12 & 13
there was a half truth
God kept blessing Abraham with wealth anyway
v17 & 18
God is supposed to be the one who controls whether children are born
a cup of water to drink
Mark 9
We should take the opportunity to serve and be kind to children and others, and the Lord, for sure, will reward us.
blind & stubborn against believing
Mark 8
Jesus had miraculously provided bread to thousand, on two different occasions, but when He spoke to his disciples using an analogy about yeast, they were worried that he meant they didn't have enough bread with them.
Jesus seemed to be expressing that by this point they should perceive and understand, that He has all power, and not to worry about food because He could just provide some if He wanted. He said, have ye your heart yet hardened?
We can be kept from understanding by being hard-hearted (stubborn). Let's believe Him instead of being so stubborn that we're blind.
Proverbs 5 - Key
My son, attend unto my wisdom, [and] bow thine ear to my understanding:
My friend just happened to share this verse a couple of days ago. It talks about inclining your ear to hear, or bowing it down, which he tied into not being proud. I just recently made a similar application to my own life, studying through Genesis.
Like my friend talked about, I'll humbly listen to others to receive wisdom.
Proverbs 5 - Outline
v1, 2, 7, 12, 13
listen up, especially to your parents
the preliminary, deceitful, attractiveness of sin, especially the sin of fornication
v4-6, 9-11, 14, 20-23
you'll be sorry, in a lot of really big ways
don't touch it with a 40-foot pole
marriage = 1 man + 1 woman
your role in your parents' home
What does it mean, for a young person to be living in his or her parents' home?
Do my parents have a right to tell me how to dress?
About parents
For children:
Colossians 3:20
For everyone:
Proverbs 23:22
About clothes
Deuteronomy 22:5
1 Timothy 2:9a
In like manner also, that women adorn themselves in modest apparel, with shamefacedness and sobriety...
Genesis 19 - Key
There seems to be so much in Genesis 18 & 19 about entreaty. For example, Abraham entreating the Lord, Lot entreating the angels, and then the men of the city, and now his sons-in-law. They did a horrible job with the way they responded. They just sat there and thought he was kidding. I saw from this, how we should listen.
I'll take it seriously when someone entreats me.
Genesis 19 - Outline
Lot, determined to do good, wouldn't take no for an answer
v4 & 5
the people of Sodom started off on the wrong foot
Sodom was not listening to entreaty, but Lot showed sacrificial honor to his visitors
Sodom, oblivious to the fact that they were being tested, had failed miserably
Lot's sons-in-law, complacent, wouldn't take his entreaty seriously
the need to obey the Lord quickly
prayer works miracles, so pray hard like Abraham because you don't know what great things might come from it
the sin-tainted origins of the Moabites and Ammonites
don't be hard hearted
Mark 6
For they considered not [the miracle] of the loaves: for their heart was hardened.
This was about stubborn, hard hearts. We should believe the Lord when He does something good instead of being stubborn. We should also be willing to listen to rebuke and consider that we might be wrong about things instead of being hard-hearted about that.
Be not afraid, only believe
Mark 5
Impossible things became possible when Jesus Christ came and worked. He seemed to want to keep reminding people about faith. He wanted to teach us that He works and does mighty and miraculous things when we believe in Him.
And, once again, faith and fearfulness are mutually exclusive. We shouldn't fear terrible things that have happened in the past, like the people in Mark 5 could have feared when their loved one had died. We should fear the Lord, and besides that, we should have faith instead of fear.
faith to shield from fear
Mark 4
I've been thinking that there's a correlation between fearfulness and lack of faith, and this verse confirms it. We're not supposed to be fearful.
Revelation 21:8
Here unbelief is listed as one of the sins of the people who will have a part in the lake of fire... So this fearfulness is definitely wrong. Notice that unbelief is listed right with it: But the fearful, and unbelieving...
The Lord says, Fear not so many times in the Bible. He also says:
1 John 4:18
2 Timothy 1:7
Modern translations translate the word fear as timidity. If I was trying to clarify that it was talking about wrong fearfulness, not about the fear of the Lord, I might have translate that word in that verse, as paranoia.
We see that there's a direct correlation between fearfulness and lack of faith. If we don't want to be wrongfully afraid or paranoid, we need to be taking the shield of faith.
Ephesians 6:16
a strong man armed
I thought of a verse recently, and as I've been reading through Mark, today I came to a verse similar to it. But I'm more familiar with this verse in Luke:
Luke 11:21
I'm more familiar with this verse. At first glance, Luke 11:21 seems like it's saying it's a pretty good idea for men to arm themselves to to keep their houses and possessions safe. Think about it: When a strong man armed keepeth his palace, his goods are in peace. Yes, it seems we should all go out and arm ourselves right now, to keep our houses and possessions safe... If you totally take it out of context!
2 Timothy 2:15
It's so important to rightly divide the Word, instead of taking one little sound bite and twisting it to mean something totally different or even opposite from what the Word really means. Let's consider the context of Luke 11:21.
1. If you look at the verse right before it, you see that Christ was not talking about an example of how godly Christians should live, but of what it's like when the devil possesses someone before Christ casts him out, and how the devil works:
v20 & 21a
I don't think that we should take, what the Bible says about how the devil works, as our example for godly living, do you?
2. The passage doesn't stop with v21, stating that the goods will be kept safe, but it continues into the next, all important verse 22: But when a stronger than he shall come upon him, and overcome him, he taketh from him all his armour wherein he trusted, and divideth his spoils.
So we see that the point of v21 was not to arm ourselves to keep our houses, and then it's promised that our goods would be safe. When taken in context, it goes on to present a strong argument to the contrary: But when a stronger than he shall come...
The passage that I read in Mark today was:
Mark 3:26 & 27
Every Word of God is good, but it needs to be used in a completely honest way, and not wrestled around to make it sound like it means something else. So think twice next time you hear a partial little "sound bite" or "clip" from the Bible, and don't assume it means exactly what it was made to sound like, being taken out of context. That's the way the devil tempted Jesus, too.
power to forgive sins
Mark 2
It's a blessing and encouragement to remember that the Son of man hath power on earth to forgive sins.
Bookmark and Share |
planet x
Alberto C./Flickr
Note: For those of you who may be unaware, dozens of major mainstream news outlets and scientific publications recently reported that Planet X is indeed real. This is a fact.
At this point what is up for debate and where mainstream and alternative researchers differ is how far away the planet actually is and if it will cause major issues on earth.
Those who have researched the existence of Planet X outside of the mainstream see the recent announcement as a sort of cover for what is becoming increasingly impossible to ignore.
(INTELLIHUB) — According to NASA imagery and amateur video taken over the past 24 days, a large celestial object, likely a brown dwarf star, approximately five times the size of earth, is currently inbound, moving toward earth at a high rate of speed from the vicinity of behind the sun.
Jan. 1
Jan. 4
Jan. 7
Jan. 8
Jul. 11
Jan. 13
Jan. 14
Jan. 17
Jan. 18
Jan. 21
Jan. 23
On August 6, 2010, Intellihub’s Shepard Ambellas interviewed one of the world’s foremost researchers on Planet X (Nibiru), which has become a topic of great interest amongst many people as earth proves to once again be in peril, reflected by drastic changes in current weather patterns.
The whole ball of wax in a nutshell
“In November of 1983 NASA’s IRAS infrared telescope discovered an unbelievably huge, massive, what looked like a slowly burning star, a big object, headed right toward our solar system from the region of Orion”, stated Dr. Jaysen Rand, researcher and author of the book Return of Planet X, in his opening remarks during the historical interview, pointing out how openly and well announced the discovery was that day.
However, like clockwork, 24-hours later the media was completely silent on the matter and you heard not even a peep as national security protocols were implemented in the highest levels of the government and media. From then on, it would be almost a complete informational blackout.
“The public didn’t name Planet X, the government did […] that’s the first rule of Planet X 101”, Rand passionately pointed out. Rand then made mention of a 1984 U.S. News and World Report article which revealed yet another clue to what NASA actually found. “They named it a brown dwarf star“, said Rand.
Jumping back in time and space 4-5 billion-years ago
“The were twelve original planets [in our solar system] just like Sitchin described […] it’s also confirmed in prophecies, cave paintings, in Vatican information, in a thousand sources different sources we cited in our book […] there is evidence that every 3600-4000-years some unbelievably huge catastrophic event strikes the earth that we’ve traced back 500,000-years in time showing when each of these 3600-4000-years periods began and ended […] And the very last one was in 1447 BCE, before the common era”, Rand stated continuing to talk about similarities between the Bible’s exodus and the Book of Revelations, chapter 8, book 11. Rand said, “We believe that this is a real phenomenon event”
Shepard Ambellas then interjected, pointing out how the Kolbrin Bible talks of “the destroyer”. In fact, Manuscripts 3:4 reads:
When blood drops upon the Earth, the Destroyer will appear, and mountains will open up and belch forth fire and ashes. Trees will be destroyed and all living things engulfed. Waters will be swallowed up by the land, and seas will boil.
And Manuscript 3:6 reads:
The people will scatter in madness. They will hear the trumpet and battle-cry of the DESTROYER and will seek refuge within dens in the Earth. Terror will eat away their hearts, and their courage will flow from them like water from a broken pitcher. They will be eaten up in the flames of wrath and consumed by the breath of the DESTROYER.
So many texts throughout history document, what is coming.
What if the book of Revelations isn’t a book of the past, but rather a document of what has already happened, time and time again, every 3600-4000-years? What if the next passing is soon? These are the type questions I’m asking.
“There are bones filled up into the back of caves at high elevations”, Ambellas pointed out in the broadcast, dovetailing with Lucas’ theory of why dinosaur bones washed up into large bone piles at the base of the Colorado mountains. Likely the close passing of a massive celestial object, like a brown dwarf star, can create havoc for people on earth, essentially swashing the waters about the face of the planet with nearly every pass as documented in biblical tales such as the story of the “Great Flood”.
All of this historically, may have been caused by the close passing of Planet X during each cycle. Real events, with real science behind them.
The orbit of X
Zecharia Sitchin, renown researcher and author, has stated that Planet X flies through space in a highly elliptical orbit, approaching earth from the south on an angular plain, then slingshoting around the backside of the sun before exiting back out of our solar system every 3600-years.
It has also been said that you can only see the brown dwarf star approaching low on the horizon from a vantage point of the earths southern hemisphere, making spotting the planet early on difficult for most of the world’s population.
Series of quakes shake area near geothermal field in Northern California
A Wikipedia entry on Zecheria Sitchin reads:
According to Sitchin’s interpretation of Mesopotamian iconography and symbology, outlined in his 1976 book The 12th Planet and its sequels, there is an undiscovered planet beyond Neptune that follows a long, elliptical orbit, reaching the inner solar system roughly every 3,600 years. This planet is called Nibiru (although Jupiter was the planet associated with the god Marduk in Babylonian cosmology). According to Sitchin, Nibiru (whose name was replaced with MARDUK in original legends by the Babylonian ruler of the same name in an attempt to co-opt the creation for himself, leading to some confusion among readers) collided catastrophically with Tiamat (a goddess in the Babylonian creation myth the Enûma Eliš), which he considers to be another planet once located between Mars and Jupiter. This collision supposedly formed the planet Earth, the asteroid belt, and the comets. Sitchin states that when struck by one of planet Nibiru’s moons, Tiamat split in two, and then on a second pass Nibiru itself struck the broken fragments and one half of Tiamat became the asteroid belt. The second half, struck again by one of Nibiru’s moons, was pushed into a new orbit and became today’s planet Earth.
Over the last few years countless people including scientists, top scholars, and universities, in conjunction with other peer-reviewed studies, have documented the fact that the moon, sun and earth are not in their proper positions as things may seemingly be unwinding in our solar system.
There has been a change in weather, seasons, tides, volcanic activity, tectonic activity and more as tornadoes are now even striking as early as June.
For years governments have been aware of an approaching celestial body (a brown dwarf star) and it’s 3600 year cycle of devastation as outlined in ancient Sumerian cylinder seals and other ancient documents.
An excerpt from the Washington Post article dated December 30, 1983, page A1 – reads;
for the California Institute of Technology, said in an interview.
Moreover, in 2011 secretive and coded military drills were run in preparation for what’s coming. In fact, the ELENIN drill involved testing a massive worldwide network that would connect and go live in realtime in the event a major worldly disaster were to take place. To boot, agencies such as NASA have already prepped their on and off-world personnel for such an event.
Not to mention that it has already been documented by astronomers that the orbital patterns and tilt of the moon have changed, likely signifying the presence of a hidden celestial object. An excerpt from a peer-reviewed paper by Lorenzo Lorio filed at Cornell Universities library reads:
Ladies and gentlemen, a Cornell University astronomer has just admitted in the above statement that they themselves are now looking into the possibility of Planet X type scenarios being real, as they themselves are dumbfounded by the data.
So is it possible NASA is hiding something?
What about all of the newly discovered planets in our solar system which have been quietly announced?
Dwarf planet near asteroid belt may contain more freshwater than earth and even some life
While Ceres may not be Plant X per say, it lets us as humans know there is a lot more going on out there in which we don’t really know yet. Interestingly enough, the new find may contain life.
Touted as the only dwarf planet in the solar system, Ceres, which is made up of about one-third the mass of the asteroid belt itself, has been shown by a European Space Agency research team to harbor vast supplies of freshwater.
While it is currently not yet known how the water is distributed onto or inside the planet, some speculate ice volcanoes could be a source.
The NASA spacecraft “Dawn” is expected to arrive at Ceres in Feb. 2015 to gather more information pertaining to the water and life on the tiny planets surface.
The Raw Story reported:
“We’ve got a spacecraft on the way to Ceres, so we don’t have to wait long before getting more context on this intriguing result, right from the source itself,” said Carol Raymond, deputy principal investigator for Dawn at NASA’s Jet Propulsion Laboratory. “Dawn will map the geology and chemistry of the surface in high-resolution, revealing the processes that drive the outgassing activity.”
Dawn, which launched in 2007, had previously orbited the protoplanet Vesta, the second-largest object in the asteroid belt between Mars and Jupiter that’s littered with rock left over from the formation of the solar system some 4.6 billion years ago.
The discovery puts Ceres in a special class of solar system objects with active water plumes, a key ingredient for life, and includes Jupiter’s moon Europa – which may have an ocean beneath thick surface ice – and Saturn’s moon Enceladus, where water jets have been spotted on the surface.
So why would NASA spend so much money, time and effort to visit such a world? Did they already suspect the possibility that Ceres houses water and possibly life?
Sun eclipsed by two massive objects traveling two different directions
After all, Ceres was named after “a goddess of agriculturegrain crops, fertility and motherly relationships”, according to Wikipedia. I mean hey, it doesn’t get more obvious than that does it does it?
Rest assured key factions of the U.S. government and NASA alike already knew that water and possibly life exists on Ceres, prompting the NASA mission in the first place. And you better believe that if NASA’s public information on Ceres is limited, their info on Planet X would remain top-secret, only to be shared with the White House per mandate.
So why hide this information from the public?
“Typically you can’t press release this stuff out to the public, because if you did society would collapse”, said Lucas with, who was sitting shotgun in the bombshell 2010 broadcast, likely hitting the nail right on the head.
Society simply could not take this information being released on CNN and all of the other mainstream networks all at once. It would be too chaotic and pandemonium would ensue. In fact, this is likely the real reason that Ronald Reagan’s Readiness Exercise 1984 (REX84) was designed for, not for a mass exodus of illegal aliens as the official plan reads.
Maybe this is the reason that FEMA camps and secret detention facilities have also been implemented all across the U.S. and quite possibly be the reason the entire Continuity of Government (COG) program was started in the first place, which was pointed out by Ambellas in the 2010 broadcast.
“What do you need to be 1-4 mile beneath the surface for”, Ambellas said, bringing up the issue of underground bases and governments need for them worldwide.
As a follow-up to the broadcast, Ambellas did an independent investigation of the Denver International Airport underground facility which Ambellas demonstrated is part of the Continuity of Government (COG) program.
In fact, according to Airport City Denver’s official website:
However, local residents and others have been questioning the new construction in and around the airport property as several red flags have been raised. In fact, since the first construction phases of the airport started in the early 1990′s, there have been several indicators that something else may be taking place on or under the grounds of the 53 square mile complex.
The Facility
• The landfill located off of Tower Rd. two miles west of the Jeppesen Terminal was added onto in the early 2000′s despite the airports appeal to the District Court against the landfill in 2002, claiming it was a FAA safety hazard. The landfill has a functioning element to it but is “mocked-up” to look like a landfill hidden in plain sight.
• A swift door will also allow access to the intermediary entrance of the facility if you have the proper “speed-pass” clearance on a Department of Defense (DOD) level. This door was also a secret to the general public until now. The actual door number is “T-47 M” located on the level 4 exterior. Update: Airport Staff, “I just went in to T47-M… nothing goes down, no steps, no elevator”.
Sun eclipsed by two massive objects traveling two different directions
The information provided by the whistleblower does indeed beg the following question. Does the DOD have any ties to areas of the airport owned and (or) operated by domestics airline carriers?
Department of Defense Ties To Domestic Airline Carriers
The Dirt Came From Somewhere
An excerpt from the FAA appeal reads, “In the Hazard Determination and Affirmation, the FAA found that the Tower Road landfill at its proposed height “would be in the radar line of sight and vehicles [i.e., dump trucks and graders] operating at the landfill may cause radar reflection and consequently create false targets.” JA 7.
The Denver Airport conclusion
The Denver Airport (Location) is part of a Continuity of Government Program and does indeed house an underground facility.
Such a facility may be put in place for such an event like the coming passing of Planet X.
Is Planet X inhabited?
According to Sitchin, the Anunnaki are from Planet X (Nibiru) and may explain stories if “giants” which were published in the bible and other writings. Some even say that Planet X has been transformed into a fully inhabitable Dyson sphere.
So what’s next?
I guess we will have to wait and see. |
DEFINITION of 'Lease Utilization'
Lease utilization is a financial ratio that measures how much a company uses leasing arrangements to acquire its fixed assets. Utilization ratios come in two types, which correspond with operating leases and capital leases. These are called operating lease utilization and capital lease utilization, respectively. It is important to know how a company utilizes leases, as lease utilization can affect other financial statement figures.
BREAKING DOWN 'Lease Utilization'
Looking at the lease utilization is a good way to identify whether differences in the financial metrics of comparable firms may be due in part to differences in the way that assets are acquired. A capital lease affects the financial statements much in the same way that buying the asset on credit would. However, if a company makes heavy use of operating leases, then the assets are not reflected on the balance sheet. Therefore, due to the lower amount of assets, it may appear that the company is generating a higher return on assets. However, this could be merely an accounting phenomenon that occurs as a result of the alternative asset acquisition method. It is always a good idea to look at how a company is acquiring and financing its assets before comparing other financial ratios like return on assets (ROA).
1. Capitalized Lease Method
A capitalized lease method is an accounting approach that posts ...
2. Synthetic Lease
A synthetic lease occurs when a special purpose entity established ...
3. Triple Net Lease (NNN)
A triple net lease assigns sole responsibility to the tenant ...
4. True Lease
A true lease is a type of multi-year lease where the lessor bears ...
5. Minimum Lease Payments
The minimum lease payment is the lowest amount that a lessee ...
6. Lease Balance
A lease balance is the outstanding sum that a borrower owes on ...
Related Articles
1. Personal Finance
The Pros and Cons of Leasing a Car
Consider these pros and cons before deciding whether or not to lease a car.
2. Managing Wealth
4 Ways to Get the Best Deal on a Car Lease
Car buyers typically negotiate when purchasing a vehicle, but many don't negotiate when leasing a car. There are several ways to save if you ask.
3. Personal Finance
Should You Buy or Lease a New Car?
Deciding whether to lease or purchase a car depends on a number of factors.
4. Personal Finance
Should You Borrow Money for a Car Purchase?
Does it make sense to take out a loan, pay cash or lease a car?
5. Investing
American Airlines’ 3 Key Financial Ratios (AAL)
Learn about the financial ratios that are important in understanding and evaluating the business and financial statements of American Airlines Group.
6. Personal Finance
Wait on Buying a Pickup (F, GMC)
Used car prices are dropping everywhere. But if you're in the market for a pickup truck, a good bargain is less of a guarantee – thanks to strong demand.
7. Investing
5 Popular Utilities ETFs in 2016 (XLU, NEE)
8. Investing
Understanding Off-Balance Sheet Financing
For anyone who was invested in Enron, off-balance sheet (OBS) financing is a scary term. Off-balance sheet financing means a company does not include a liability on its balance sheet. It is an ...
1. What are some types of off-balance sheet assets?
Learn about what types of assets are often accounted for using the off-balance sheet method and why this accounting technique ... Read Answer >>
Trading Center |
Human Adaptive Behavior
Discovering the wise aspects of one’s behavior
You are having the unique opportunity of witnessing the most significant paradigm shift in science that was made in the last century, while you have the opportunity of profiting from it. This shift is based on the discovery of the ontogenetic intelligence of nature that regulates the evolution of living beings.
As adaptive systems have open boundaries you need to experience them in order to understand them. External observations are meaningless fantasies.
The personal experience needed to apprehend the paradigm shift:
Human Adaptive behavior requires influencing the environment and manage the influence of the environment.
The Ontogenetic Intelligence of NatureThe decisions of mature people naturally have a purpose, a maximal strategy in order to influence the environment to generate growth and a minimum strategy to ensure survival.
This behavior is the natural behavior of wise people who always have a maximal strategy and a minimum strategy to achieve a purpose. The knowledge of both strategies allows people to have the concepts of what needs to be done. Concepts are the drivers of human actions. Wisdom implies having conceptual knowledge in order to generate value for others.
This wisdom is possible because it has its origin in the intelligence that underlies nature. This intelligence also has a maximal strategy to expand the boundaries and has a minimum strategy to survive. Mature people naturally tend to emulate this intelligence of nature without even knowing that it exists.
That is why you need to get in touch with the field in which you achieved wisdom in order to discover the way you already emulated the organization of nature by assuming the responsibility for results using a maximal strategy and a minimum strategy to achieve them.
You have to consider that 3 to 5 year-old children approach reality using concepts. This is, of course, an intuitive approach. Small children still have a “direct” connection with nature. They do not have to make a conscious effort to emulate the ontogenetic intelligence of nature. They just do it. That is why children are so adaptive.
“It is a pity that Albert Einstein died being a child.”
Every person that exceeded adolescence has some place where she/he is wise. This means that she/he has a strategic approach to some aspect of reality.
Please take your time. Discovering the wise aspects of one’s behavior takes time.
Academic Committee
|
A religion of Arbre, likely analogous to Protestantism on Earth.
Orthodox religion is referred to as "Bazian," and there are several references to the fall of Baz, which was apparently the home seat of a large empire. There are several candidates for analogues to Baz; the most likely appear to be Rome and Constantinople. Despite the fall of Baz, a number of people still count themselves as "Bazian," and the religion apparently thrives. There is mention of a Bazian nun who is also a schoolteacher; she leads the children of her suvin, identifiable by their uniforms, through the tour that Erasmus gives of the museum and artifacts housed in the Unarian math. (Since this museum appears to be accessible through the Unarian Gate and not the Day Gate - as some of the concent's facilities are - it is probably not open to the public except during Apert.) A Bazian monastery is also mentioned; Erasmus and part of his Convox group shelter there for a night. "Bazian" religion, then, would appear to be analogous to Catholicism.
If this is the case, then "Counter-Bazian" is indeed analogous to Protestantism, and like the word "Protestant," "Counter-Bazian" is an umbrella term for a large number of religious groups which hold beliefs that generally recognizable to one another and to Bazian, but which are irreconcilable with either each other or with Orthodox Bazian religion. Two distinct Counter-Bazian branches are mentioned: the 'Samble' ark, which developed around Saunt Bly (who was himself agnostic or atheistic), and the Warden of Heaven's. The Samble ark - which, according to faithful member Gnel Crade, is dying - is the progenitor of the Warden of Heaven's ark; it will be discussed first.
The Samble-ites (for want of a better word) believe in studying ancient texts in the original language, which is Orth, rather than popularly-spoken Fluccish. Crade, and very likely most of his co-religionists, have taken it upon themselves to learn Orth, though Erasmus calls Crade's spoken accent "wild," suggesting that he had little formal instruction in the language. The emphasis placed on reading holy texts for oneself without a mediating priest is strikingly similar to Lutheranism. (Luther, incidentally, was a friend and correspondent of the Humanist philosopher Erasmus.) Crade says that his group was well aware that Saunt Bly did not believe in God, but they feel a kinship with his struggle. Fraa Erasmus' group arrives during a religious service, and though they remain outside of the ark, they can hear passionate singing. Crade later tells Erasmus that his religion is dying off, slowly being killed by an offshoot which has recently grown very popular: the Warden of Heaven.
The Warden of Heaven - whose self-given title is reminiscent of the titles of mathic hierarchs - claims religious descent not from the Samble ark but from the maths: he claims that he brings 'proof' of the existence of God which the mathic world - with the possible exception of the Millenarians - is trying to hide. He dresses in roped robes which mimic the bolt and chord of the avout. Unlike the Samble ark, which stresses learning (although not theorics), the Warden of Heaven tells people what to believe, thus acting as a mediator between his flock and God. The Warden of Heaven's ark does not otherwise appear to resemble traditional Bazian orthodoxy. It is hinted at the end of the book that the Warden of Heaven's ark has fallen into disarray following the Warden's death; Barb's father, Artisan Quin, mentions that his cousin, Artisan Flec, is lost religiously, but also has no desire to study: he simply wants to be told what to believe. That the Warden of Heaven's ark is apparently collapsing suggests that the WoH made no, or at best unpopular, choices for his succession or the continuation of his ark after his death. The manner of his death, and his half-heard conversation with Jesry shortly before it, suggest that the Warden was not a particularly forward-thinking man.
Erasmus encounters another religious group, the Kelx, though they do not appear to be related to or an offshoot of the Bazian religion, and instead focus on the Magistrate, the Criminal on trial, and the Innocent who was one of the Criminal's victims.
It is not known what religion Laro and Dag subscribe to; they do not appear to be related to Bazian, Counter-Bazian, or Kelx. Their belief that the avout cast spells, and Laro's interpretation of Erasmus' actions to save Laro's life, suggest a deeply superstitious belief system in which all avout are regarded with outright hostility.
For their part, the avout have a tendency to refer to anyone who believes in God as a "Deolater," including those avout who profess a belief in God. |
Tips For Healthy Living
By Adriana Rueda
Eat slowly
We are often in a hurry while eating. The pace of the modern world has disturbed some of our basic eating habits. Studies have shown that people who eat quickly consume 55 % more food than people who eat more slowly. This is significant. The reason behind it is that while eating hastily, we often don’t receive the signals from our over-stretched stomach, which is trying to tell us, “I am full.” These signals are internal control factors that regulate our appetite and tell us to stop when our stomach is appropriately full. Eat patiently and slowly, taking at least 15-20 minutes to finish each meal.
The balanced meal
Balanced meals can help you maintain your weight better than anything else. Know the ingredients and estimate the percentages of carbohydrates, fats, and proteins. Keep them in balanced proportion. Along with that, cut down on alcohol, sugar, and excess salt. Eat more vegetables and fresh fruits and avoid processed foods.
Protein intake
Proteins are essential for the body. A research study of two groups of obese people showed that the group placed on a high protein diet lost almost 80 % of their weight in a six-month period, as compared to the control group, which was served a moderate protein diet. The high protein diet also helped individuals stick longer to their diet plans. For females, add one average hand-sized piece of chicken, fish, or beef to every serving. Males should add twice that serving size of protein per meal.
Eat carbohydrates that are rich in fiber and low in sugar. They take more time to absorb and keep your belly full longer. These foods include pasta, bread, and white rice. The best time to eat carbohydrates is after a heavy work out. This is the time when your body needs to replenish the energy sources.
Amount to eat
Nutritionists suggest that you eat until you feel 80% full. This means that you eat just until you are no longer hungry, and stopping just before you feel uncomfortably full. The idea is that once you start this practice, your appetite gets lower. This helps you limit your required amount of food, and it helps your body digest the food you did eat more efficiently.
Increase your water consumption to 10-12 glasses a day. It not only helps to properly hydrate your body, but it is good for maintaining various bodily functions. Drink one glass before every meal. This helps to fill up the stomach with some amount of water. Hunger pains can often be confused with dehydration. Our body may actually be craving for water, but we are filling it with food. Drink a glass of water first, and then re-evaluate your hunger level.
About the author: Adriana Rueda is a health advocate, training in nutrition and diet planning and currently getting certified as an Integrative Nutrition Health Coach. She is from Venezuela and now lives in Canada. Her passion is to teach you how to make a healthy lifestyle a norm.
Vanessa Estrella
A Mexican American model Vanessa Estrella from Chicago now living in the Bay Area. One of her favorites when it comes to fashion is Jennifer Lopez.
Bea Mireles
A Mexican from Barcelona, with a passion for fashion and unique lifestyle.
10 MUST HAVE sneakers under $50
10 MUST HAVE sneakers under $50Hermosaz let's be honest, we all…
Vanessa Velásquez
A model from El Salvador with a passion for fashion and plan to start her business based on her unique vision.
Subscribe to our newsletter!
This post is also available in: Spanish |
Part 4: Why Were The Chinese Head Tax and Chinese Exclusion Laws Enacted?
The following is the fourth and last part of an answer to the question, “Why were the Chinese Head Tax and Chinese Exclusion Laws enacted?” Once again, the emphasis is on presenting the series of events which preceded and precipitated both the Chinese Head Tax and Chinese Exclusion Laws. An awareness of these events is essential to understanding why the laws were enacted. (Source: In The Sea Of Sterile Mountains by James Morton, M.D. and former UBC Assistant Professor of Medicine)
Part 4 shows a recurring theme in this issue: attempts by some employers and Chinese contractors to import cheap Oriental labour regardless of the availability of labour already in Canada. Labour’s repeated complaint was that Chinese labourers had an unfair advantage in the job market because the Chinese contractors made agreements with employers for Chinese labourers to work more cheaply than labourers in the rest of the population.
Modern readers of the events would conclude that the Chinese contractors possessed many of the qualities of today’s “snakeheads”. If the term “victim” is to be used, it is especially true to say that Chinese labourers were victims of Chinese contractors.
Prime Minister Mackenzie King, who had visited B.C. to settle Japanese and Chinese damage claims after the 1907 Vancouver Riot, and who was well-versed in the issue, summarized the complaints against the Chinese as being “primarily an economic concern”.
Of special interest is a 1910-11 Royal Commission Report which revealed widespread, organized smuggling of Chinese on large steamships, as well as on tramp vessels, possibly with the involvement of contractors. This shocked the Commission Chairman as well as the general population.
It probably also raised the level of government frustration in dealing with this issue. The extent of this fraudulent entry into Canada and that of the earlier illicit trade in re-entry certificates have not been calculated, but both raise serious questions about whether current talk of a Canadian government apology and restitution should ever have started.
In addition to the Royal Commission, familiar calls for “Canada and Canadians First” were heard from soldiers (newly returned from WWI) looking for employment. Their protests about an oversupply of labour were difficult to ignore because of the service that the soldiers had rendered to Canada. Finally, businesses, who felt threatened by competition, began a lobbying campaign.
In early 1922, all 13 of B.C.’s MP’s (Liberals, Conservatives and Progressives) met with Canada’s immigration minister and unanimously urged him to enact exclusion legislation. Initially, the Mackenzie King federal government rejected the call, but it eventually met with the Government of China which agreed with the request in early 1923. Chinese consuls, merchants and students were still to be allowed entry to Canada.
(1) In September 1909, the President of the Grand Trunk Pacific Railway called for 35,000 Oriental labourers to construct another railway. The labourers, it was said, would return to the Orient when the project was finished. Having already seen Chinese “temporary railway workers” ignore their obligation to leave, the Vancouver Trades and Labour Council telegrammed Prime Minister Laurier: “We will not stand peacefully for the proposed further importation of Oriental labour into this Province at the behest of merciless, profit-seeking railway contractors. ….there are lots of available jobless men in Canada.” Eventually, railway construction began with both provincial financial guarantees for the railway and provisions to exclude cheap Oriental labour. (P. 215)
(2) In late 1910, Prime Minister Laurier heard reports that “the Immigration Act was being frequently ignored and that both Chinese and opium were being smuggled into the country indiscriminately”. Prime Minister Laurier appointed another Royal Commission on immigration to investigate. (P. 219)
(3) Mr. Justice Denis Murphy of Vancouver began 2 months of hearings on December 15, 1910. He was told Chinese were using two methods to avoid paying the $500 head tax. (a) Since merchants were exempt from the head tax, a number of groups (labourers, clerks and sundry others) got themselves classified as merchants. They did this by joining a business firm in China and paying $100 to become a bona fide merchant under the Immigration Act.
The Government of Canada’s Vancouver interpreter, the corrupt Yip On, was involved in this arrangement, possibly with the complicity of contractors. (b) “The second method was for the Chinese to hide in the holes in the huge coal bunkers of the Oriental steamships.” When port guards, who had been appointed from a patronage list, were conveniently in the ship’s saloon, “a large army of Chinese” stowaways left the ship. (p. 220)
(4) In late February, 1911, Mr. Justice Murphy made several recommendations: (a) The interpreter Yip On should face criminal charges. In the meantime, however, Yip On had fled to China. (b) The scrutiny of ships to prevent illegal entrants and the methods of identifying Orientals had to change. Murphy described the guarding of the ships as “farcical” and “the method of identifying the Chinese by such methods as names, birthmarks and scars as useless”. (c) Large-scale illegal entry had to be stopped.
“There was no doubt that many Chinese entered the country (illegally) through Vancouver, but, said Justice Murphy, ‘the Port of Union Bay (on the east coast of Vancouver Island) is practically a free port for the entrance of illegal Chinese and the smuggling of opium’. “The great ships from the Orient loaded their coal bunkers (at Union Bay) and it was here that Chinese and opium were discharged with wreckless abandon. Nanaimo, Ladysmith and Boat Harbour, served largely by tramp ships, were almost as bad.” (P. 221)
(5) The total number of illegals brought into Canada in this way was unknown. However, the number of legals from 1904 to 1910 (with some revisions) was as follows: 1904-4; 1905-8; 1906-50; 1907-745; 1908-893; 1909-469; 1910- 1286. Justice Murphy’s shocking revelations about illegal entrants (as well as the increased numbers of legal Chinese) led to the defeat of all of Prime Minister Laurier’s B.C. Liberal M.P.’s in the federal election of September, 1911. Laurier’s government fell.(P. 221)
(6) In 1912, after 300 years in power, the Manchu Dynasty in China fell. The queue (a symbol of Chinese subjugation by the Manchus) and the traditional costume came to an end immediately in China and eventually in the West. (P. 222)
(7) An editorial in Vancouver’s News Advertiser pointed out that there were 25,000 Asiastics (Chinese, Japanese and East Indians) —one-tenth of the population—in B.C. in 1912. “It originally was expected that the $500 head tax would be prohibitive to the peasant Chinese, and indeed it was for a few years, but..(in 1911), 5000 paid the tax, in 1912, there were 7000, and in 1913, the figure was expected to go over the 10,000 mark. Five hundred dollars was no longer a deterrant. A labourer, or servant, the editor said, could save this much in a year.” (P. 224) (Note: The volume, “Historical Statistics of Canada”, shows that hourly wage rates in Vancouver for labourers had almost doubled between 1901 and 1913. Between 1901 and 1920, hourly rates rose by 2 1/2 times. A decline followed over the next two decades.)
(8) In 1914, Ottawa passed a new naturalization law extending the requirement for residence in the British Empire from three years to five (the last year being in Canada), adding an educational test, and making an adequate knowledge of English or French now necessary. (P. 225) (Note: This was probably a response to earlier pressure from B.C., particularly its Natal Act.)
(9) On May 23, 1914, the Komagata Maru, with 370 East Indians aboard, arrived in Vancouver Harbour. It was challenging the Canadian law which required that immigrants had to come directly from their country of origin.(P. 226) The Komagata Maru had left from Hong Kong, not from India. It stayed in Vancouver Harbour for 2 months. (Note: This law had been passed as a result of Prime Minister Laurier’s talks with a Japanese government official in 1907. Laurier had requested that Japan limit its immigration to Canada to 600 per year.)
(10) “Not one of the passengers was allowed ashore, the East Indians would not allow the Japanese crew to depart, and a police force was repulsed when it tried to climb aboard. HMCS Rainbow then fitted up her great guns in Esquimalt (beside Victoria on Vancouver Island), steamed bravely across the gulf, and trained her armament on the single stack of the Komagata Maru. ‘After a day of excitement unparalleled in Vancouver’s history,’ as the News Advertiser put it, the East Indian passengers decided to relent. The Komagata Maru left and 12 days later, World War I began. (P. 226)
(11) In 1914, over 7000 Chinese entered Canada, but a traditional exit near the end of the year for Chinese New Year in China was higher than normal, possibly because “war contracts had evaded British Columbia” and resulted in unemployment. Also, “the great Oriental ships which brought business, in the form of tea and silk and many other articles, were conscripted for wartime duty”. (P. 226)
(12) Vancouver MP H.H. Stevens “accelerated the exodus of Chinese by promoting an order-in-council which allowed the Chinese to return…(to China) for the duration of the war, after which they would be allowed to re-enter without paying the head tax”. The Trades and Labour Council estimated there were 6000 unemployed Orientals. (P. 227)
(13) “China had declared war on Germany in August, 1917. It “sent a reported 200,000 ‘coolies’ to work behind the lines in France. … many of these travelled across Canada in bond from Vancouver. A camp was set up for them in Petawawa (Ontario), where they rested before continuing to France.” (P. 229) Naturalized Japanese and Chinese were conscripted and sent to Europe. A memorial in Vancouver’s Stanley Park attests to this. General George Pearkes recalls that “at least one platoon of the 52nd Batallion was composed largely of Chinese Canadians who fought in the Ypres salient in 1917.” (P. 229)
(14) Some businesses pressured the federal government to abolish the Chinese head tax because of a labour shortage caused by conscription. But after seeing the attitudes of early-returning soldiers in 1918 to men who had escaped conscription, and forseeing possible similar behaviour towards Chinese occupying jobs the soldiers believed they should have, it wisely refused. (P. 230)
(15) Forty-five thousand of the Chinese who had worked behind the lines in France were to be returned (to China) through B.C. ports. “Shortly before the first Armistice Day, 1450 of these coolies arrived by train, heavily guarded by Canadian and Imperial troops. They were transferred to the Princess Charlotte and taken to William Head, the quarantine station on Vancouver Island, to await the next ship to the Orient. Two months later, another 3500 arrived…. In March 1919, they began rioting and 2000 broke out of their enclosure. Most of them were ’rounded up and herded back’ at bayonet point, but an indeterminate number slipped away to melt into Victoria’s Chinatown.” (P. 232)
(16) Returning soldiers expected to see some appreciation for their efforts. “The Great War Veterans’ Association went on record as favouring the complete cessation of Oriental immigration for 20 years.” The Retail Merchants Association pointed out that while Canadian boys were fighting in Flanders, Orientals (and southern Europeans) stepped in to take over much of the commerce in the province.
To counteract this antagonism, the Chinese in 1919 set their quota (of bonds to be purchased) at $50,000. This was soon subscribed, and a second goal of $100,000 was soon achieved. A few weeks later, in protest over Japan’s imperialistic policy in Asia, Chinese grocers refused to sell Japanese oranges, a luxury to which British Columbians had become accustomed during the Christmas season.” Japanese wholesalers were left with a mass of rotting oranges. (P. 233)
(17) In 1920, reacting to reports that Japanese were buying orchards in the Greater Vancouver area and in the Okanagan, the Provincial Board of Trade began to lobby government for more controls. (P. 233)
(18) “Unemployment and the presence of a militant group of returned men (soldiers) brought further pressure upon the various governments involved. Unemployed veterans responded to a tag-day in Vancouver in January, 1921, for the benefit of famine-stricken China. Standing beside Chinese and white girls who were selling tags on every corner of the city, the veterans displayed signs which said: ‘Canada first—China last.’ ‘We licked the Hun and this is what we got.’ A 25-cent meal ticket was attached to the sign.” Other signs read, ”Why not take care of our own homeless, starving and unemployed?’ ” , (P. 234)
(19) “The veterans were bitter. It seemed strange to them that money should be collected for a country that had played no part in the war, and they became even more incensed when they read in the newspapers that eggs were being imported from China. If Chinese were starving, why did they export eggs? They were told that Chinese had always given generously to local relief and patriotic funds.” (P. 234)
(20) “In the post-war period, then, the Chinese were faced with new problems: unfriendly business organizations, unemployment, organized trade unions, militant returned men (soldiers) and anti-Japanese sentiment (since antipathy to one Asian nation always affected the others.).” (P. 234)
(21) “Early in 1922, another great campaign against the Oriental was begun, culminating in the appearance of British Columbia’s 13 MP’s…before Charles Stewart, the Minister of Immigration. They demanded total exclusion of all Orientals from the province. Stewart was most impressed with the unanimous opinion of members from all parties; he expressed his personal sympathy and promised an early consideration of the problem.” (P. 237)
(22) In speaking in Parliament in 1922, Prime Minister Mackenzie King described Asiatic immigration as “not a local or provincial matter; it was a national or international one. Although it was partly racial and religious in its nature, it was primarily an economic concern. The head tax had been ineffective,…but he did not believe in exclusion”.However, more pressure followed from B.C. organizations and the B.C. Legislature.
Finally, on February 23, 1923, “Charles Stewart, the minister of immigration. stated that the government of Canada had been in communication with the Chinese consul-general in Ottawa, who had just returned from discussions in Peiking. It had been generally agreed that no more Chinese would enter Canada, the exceptions being consuls, merchants and students. Thenceforward, there would be strict regulation of Chinese already in the country, Vancouver and Victoria would be the only ports of entry, and a controller of Chinese immigration would be appointed. The Republic of China had agreed to the stipulations and there was no ill will. The greatest stumbling block, trade, would not be affected.” (P. 238)
(23) Protests followed in B.C., stating that this was not really an exclusion law because of previous fraud that Canada had experienced with granting exceptions to merchants and students. But the federal agreement stood. “The average annual number entering the country for the 11-year period ending in March 1922 was 2,294. From 1924 to 1947, only eight Chinese were admitted as immigrants.” (Pp. 239-242) |
Narcolepsy (NAR-ko-lep-se) is a disorder that causes periods of extreme daytime sleepiness. The disorder also may cause muscle weakness.
Most people who have narcolepsy have trouble sleeping at night. Some people who have the disorder fall asleep suddenly, even if they’re in the middle of talking, eating, or another activity.
Narcolepsy also can cause:
• Cataplexy (KAT-ah-plek-se). This condition causes a sudden loss of muscle tone while you’re awake. Muscle weakness can affect certain parts of your body or your whole body. For example, if cataplexy affects your hand, you may drop what you’re holding. Strong emotions often trigger this weakness. It may last seconds or minutes.
• Hallucinations (ha-lu-sih-NA-shuns). These vivid dreams occur while falling asleep or waking up.
• Sleep paralysis (pah-RAL-ih-sis). This condition prevents you from moving or speaking while waking up and sometimes while falling asleep. Sleep paralysis usually goes away within a few minutes.
Learn more about Narcolepsy |
Your browser doesn't support javascript.
VHL Regional Portal
Information and Knowledge for Health
Home > Search > ()
Print Export
Export format:
Add more contacts
| |
Abstinence-Only-Until-Marriage Policies and Programs: An Updated Position Paper of the Society for Adolescent Health and Medicine.
J Adolesc Health; 61(3): 400-403, 2017 Sep.
Article in English | MEDLINE | ID: mdl-28842070
Abstinence from sexual intercourse can be a healthy choice for adolescents, particularly if an adolescent is not ready to engage in sex. However, government programs exclusively promoting abstinence-only-until-marriage (AOUM) are problematic from scientific and ethical viewpoints. Most young people initiate sexual intercourse as adolescents or young adults, and given a rising age at first marriage around the globe, increasingly fewer adolescents wait until marriage to initiate sex. While theoretically fully protective, abstinence intentions often fail, as abstinence is not maintained. AOUM programs are not effective in delaying initiation of sexual intercourse or changing other behaviors. Conversely, many comprehensive sexuality education programs successfully delay initiation of sexual intercourse and reduce sexual risk behaviors. AOUM programs inherently provide incomplete information and are often neglectful to sexually active adolescents; lesbian, gay, bisexual, transgender, and questioning adolescents; pregnant and parenting adolescents; and survivors of sexual assault. Promotion of AOUM policies by the U.S. government has undermined sexuality education in the United States and in U.S. foreign aid programs to prevent HIV infection. In many U.S. communities, AOUM programs have replaced more comprehensive approaches to sexuality education. |
Staci Bilbo's research featured on Duke Today
Tuesday, May 22, 2012
How Staci Bilbo's research could illuminate human brain development:
This article originally appeared in Gist from the Mill, the news magazine from the Social Science Research Institute.
Staci Bilbo is one of the few researchers in her field who meld neuroscience and immunology techniques.
Article from Duke Today
Editor's Note: This article originally appeared in Gist from the Mill, the news magazine from the Social Science Research Institute.
DURHAM, NC - Researchers sometimes go to great lengths to construct animal models that could shed light on human problems. Staci Bilbo, in studying the immune system and brain development, has been known to replicate life in a low-income housing project for her rodents and enroll the pups in a rodent after-school program. All this to determine what happens to human babies born to stressed mothers exposed to air pollution and what can be done about it.
"We're trying to figure out a behavioral intervention, like an enriched environment for the offspring," Bilbo said. "We take the pups to a playroom for a few hours each day and ask whether that reverses any of the negative effects we've seen."
Bilbo, assistant professor of psychology and neuroscience at Duke, is one of only a few researchers studying microglia, immune cells that reside in the brain. She looks at what happens in neural-immune interactions in the brain under various conditions and how that affects brain development. Her work has won widespread acclaim. Many of her research papers have been published in highly respected journals, and she recently received the Frank Beach Young Investigator Award from the Society for Behavioral Neuroendocrinology. She has been a very successful grant writer and was elected to her department's advisory committee while an assistant professor. Her fall class evaluations were among the top five percent from across the university. All this in the first eight years of her career after graduate school.
Neuroscientist Staci Bilbo. Photo by Jon Gardiner.
"One of the most exciting things we're doing is trying to model socio-economic status in animals," Bilbo said. Poor neighborhoods not only have poor housing conditions but more maternal stress, fewer resources and greater exposure to toxins because they're usually located closer to highways -- all cumulative factors people in poor neighborhoods face that people in wealthy neighborhoods don't. Researchers rarely model cumulative risk factors, she said, because "throwing a bunch of factors in together gets very messy. "But people are messy."
Through work done in collaboration with a research grant from the Environmental Protection Agency and funded by a Research Incubator Award from the Duke Institute for Brain Sciences (DIBS), Bilbo has found that giving air pollutant particles to rodent pups themselves doesn't change their brain or immune system much. But stressing the pregnant mothers while exposing them to pollution has a hugely synergistic effect on their offspring, she said.
"They're much worse off," she said of those pups. Once the baby mice grow up, they have cognitive deficits and anxiety and changes in metabolism that make them heavier. Bilbo's research is designed to tease apart any behavioral change in the mother that is mediating something in a pup from a physiological effect, such as transferring stress hormones while nursing the pup. Non-traditional in her methods, she is one of a few researchers in her field to meld neuroscience and immunology techniques, employing flow cytometry, a method of sorting cell types to find out what brain cells are producing.
"We're very interested in what about mom is producing the effect and how that's transferred to her pups," Bilbo said. "Is she changing her behavior? Or are her stress hormones getting to the fetus and interacting with the toxin exposure in an inflammatory cascade?"
In graduate school, Bilbo began with the notion of plasticity in the immune system: External events could impact the immune system, which would respond in an adaptive way to organize other systems in the body. Her research is built on emerging research that showed that stressors and nutritional deficiencies during development could permanently change metabolism, stress reactivity, anxiety and propensity for depression later in life. She figured it might affect the immune system, too.
First, Bilbo examined the interaction of the immune system and endocrine system. When she reduced the length of time Siberian hamsters were exposed to daylight, their bodies responded as if it were winter -- their fur grew thicker and whiter, their reproductive systems turned off and their immune systems kicked into high gear.
Randy Nelson, her doctoral mentor at Johns Hopkins University (he has since been successfully recruited to Ohio State), said Bilbo stands out in her ability to take information from many disparate fields and put it together in new, fresh ways that cause other researchers to say, "Of course!"
"But it took Staci to figure it out and do the critical studies," Nelson said. "She's brilliant in looking for unexpected outcomes and following those up in her work." Bilbo's interest in the brain's role developed as she studied sickness behavior. She discovered that the organized responses to illness an animal exhibits -- lethargy, fever, reduced interest in eating and drinking -- were adaptive, not pathological, behaviors.
"They're recuperative behaviors that help you overcome the infection more quickly," she said. "They're very cool because they're a motivational shift. You're not motivated to do the same things you usually do, and you have a very strong motivation to sleep. That implicated the brain."
Brain development is a very underexplored area, she said, yet it presented an interesting plasticity experiment: short-term plasticity resulted in long-term changes.
"The brain's development must be the time that all of these different things were set up," she said. "I looked at neuralimmune interactions in the brain and got immediately fascinated because I found all this early evidence that the immune system was critical for brain development."
Harris Cooper, chair of Duke's Department of Psychology and Neuroscience, said that Bilbo's research on immune system compromise influencing risk or resilience for later brain functioning and behavior speaks to a broad spectrum of issues that interest scholars across psychology and other social sciences.
"Her work helps us understand serious concerns about the implications of childhood poverty," Cooper said. Bilbo is one of the pioneers in the field of understanding how the inflammatory response of the immune system affects other areas of functioning later in life.
Quentin Pittman, a neuroscience researcher at the University of Calgary, is familiar with Bilbo's work and, like many others in the field, holds her research in high regard. Her studies of microglia, the white cells in the brain that act as scavengers against infection, and how they are modulated by early infection, has implications for vulnerability in adults.
"Many central nervous system diseases have a very strong inflammatory component to them -- Alzheimer's, Parkinson's, MS, dementia -- and the states of obesity and autism," Pittman said. "In the area of neuroinflammation, she's the most promising young investigator I know of."
Bilbo has recently uncovered a new class of molecules that could be useful in treating addiction. Yet she doesn't ignore the importance of behavioral interventions, like maternal bonding, exercise and the rodent playroom fun.
"You can't re-create a behavioral experience with a pill," she said. Bilbo grew up mainly in Texas and received an undergraduate degree in psychology from the University of Texas at Austin. She did her graduate work at Johns Hopkins University, obtaining her Ph.D. in psychological and brain sciences in 2003. She conducted postgraduate work at the University of Colorado's Center for Neuroscience, where she continued to be extraordinarily productive in writing and publishing research papers.
She joined Duke's faculty in 2007. She has been invited to speak at dozens of colloquia in the past few years and has published more than 40 articles and several chapters and abstracts, and serves as a reviewer for many well-respected journals. In an era of tight funding, she secured major grant funding for three path-breaking studies that she is now conducting simultaneously. She recently completed two others.
Bilbo is uncommonly efficient, said Nelson, her mentor at Johns Hopkins. When she had an idea for a project, he remembered, she would write up a protocol and explain what she planned to do in the study. She included the previous research on the topic, her hypothesis and what she intended to do with the results, and laid out the methodology. Once he approved her project, she was off and running. As soon as she got the results, she'd plug those in and take a few days to write the discussion section.
"Within a week of the study being completed, she had a paper to submit, and a very nice one at that," Nelson said. "She was the easiest grad student I had -- very independent, smart and highly motivated. She was the entire package."
Her longtime friend Jacqueline Wood attested to Bilbo's efficiency. Wood remembers sitting next to her in class, as an undergraduate, watching her take copious yet concise notes in a compact notebook.
"She's very observational," Wood said. "She's very patient and a good listener."
Wood also saw Bilbo's maternal side, not just with her whippet and cats at home, but the creatures in her lab. "She took very good care of her laboratory lizards, and the crickets she fed to them," Wood said.
Maternal bonding, among other behavioral interventions, can set the trajectory for the way the brain works for the rest of the lifespan. Bilbo's research underscores the importance of prenatal care and resources for moms, something the U.S. doesn't do a very good job of, according to Bilbo.
"The pregnant mother is a vastly underexplored slice of the population," Bilbo said, "and arguably one of the most important." |
07/11/2018 - 9:39am
Check out these books and Web sites for craft project ideas that will bring you something of the outdoors inside your house all year long:
06/20/2018 - 8:43am
Cover to Gone-Away Lake by Elizabeth Enright
“How glorious!”
06/27/2018 - 3:11pm
It's a Great Month for National Parks
04/02/2018 - 1:59am
Cover to Spectacular Spring: All Kinds of Spring Facts and Fun by Bruce Goldstone
If your young child likes vivid photographs with lots going on and lots to think about, your family will enjoy sharing Spectacular Spring: All Kinds of Spring Facts and Fun, by Bruce Goldstone. Like many of the Dorling-Kindersley books, this one has two ways to read it.
For example, one headline reads, “Days Get Longer." You might prefer to just go from headline to headline for the youngest listeners. As your children grow and their interest levels in the details of the world around them increase, bring in the rest of the words on the page. Below "Days Get Longer," you'll see, “Spring begins on the vernal equinox. In the Northern Hemisphere, that’s a day near March 20 when day and night are both 12 hours long.”
For older readers/listeners, there are also pages devoted to some of those how-and-why questions, with their own bright illustrations, such as, “How Do Umbrellas Work?” and “Seeds Travel in Many Ways.”
02/28/2018 - 11:05am
One morning, the old wooden dam on the Rappahannock River went up in clouds of smoke. It was a huge thing—ancient and strong, built in layers to tame the river so that the power of the water pushing against it could provide electricity for the town. But it had been years since anyone tapped that power. Now, the dam was falling apart, and it was decided that it had become dangerous. So the Army Corps of Engineers blew it up one morning, and the river was flowing freely again—just as it had in previous centuries. By getting rid of the dam, the river had a chance to go back to being more like it once was. There would be more fish, which would mean more birds, and, really more of everything.
10/02/2017 - 1:48pm
Cover to Over and Under the Pond
A boy and his mother are canoeing on a pond in the Adirondack Mountains. It is peaceful place, maybe even dull. Or, is it? The boy asks his mother, “What’s down there?”
So many things! His mother tells him about them, from the minnows, crayfish, and bullfrogs to beavers hunting “delectable roots” found in the mud and otters clawing for freshwater mussels.
And, over the pond? A great blue heron catches one of those minnows for his dinner. A moose munches a mouthful of waterlilies. As the sun sets, mother and son paddle back to shore and head for home. In the dark, life goes on at the pond. Raccoons come out to prowl, and catfish glide as they seek their suppers in the cool of the night.
Kate Messner’s Over and Under the Pond does several things very nicely. First, it tells a soothing story, perfect for bedtime. But it also introduces an ecosystem, making the science of living things and the secrets found below a pond’s surface very accessible, and it manages to do so without sounding like a textbook.
06/26/2017 - 1:07pm
If you like Animal & Insect Books
Are you looking for books on animals and insects? Check out these fun non-fiction and easy readers below.
Animalogy: Animal Analogies by Marianne Collins Berkes
Uses analogies to teach the similarities and differences between animals, including their sounds, physical adaptations, behaviors, and classes. (catalog summary)
Animals: A Visual Encyclopedia by James Buckley
Animals: A Visual Encyclopedia
by James Buckley
Animal Planet Animals: A Visual Encyclopedia profiles the seven major animal classes—mammals, birds, reptiles, amphibians, fish, arthropods, and other invertebrates—and features more than 1,000 stunning color photographs of animals in action. (catalog summary)
04/27/2017 - 2:24am
Cover to If You Love Honey: Nature’s Connections
This bright picture book is a great introduction to how nature works for rather young children. If You Love Honey traces the connections between the wild world and its inhabitants from honey to honeybees to dandelions to ladybugs to goldenrod to . . . well, you get the idea.
Cathy Morrison’s detailed illustrations give kids a friendly look at the natural world. The animals and plants that rely on each other to thrive might be found every day in your neighborhood park, but the vivid colors and sharp lines put them in the spotlight for story time.
11/01/2016 - 12:51am
Nancy Tafuri
When Nancy Tafuri began her illustrating her own marvelous stories, she had a hard time at first finding a publisher who would believe in her work. Fortunately for the many, many children who have been delighted by her books, Nancy persisted, learning more about her craft while waiting to be published. Her books were successful, and they definitely found their young audiences. Eventually, the New York Times would call Nancy Tafuri “the Queen Mother of Warmly Soothing Animal Bedtime Stories.”
04/03/2014 - 1:44pm
Citizen Science -- No Degree Required
You don't have to be a rocket scientist to help astronomers learn about the Universe. You don't need a degree in biology to help track bird populations. Interested in what whale songs mean? You guessed it—you don't need to be an oceanographer to help scientists figure it out. All it takes is an interest and computer access and you can join the growing ranks of Citizen Scientists. Most projects provide tutorials or clear instructions on their websites. You don't even have to be an adult!
Subscribe to Nature |
When portrait photographs are composed and captured in a studio, the photographer has control over the lighting of the composition of the subject and can adjust direction and intensity of light. There are many ways to light a subject's face, but there are several common lighting plans which are easy enough to describe.
here are many different techniques for portrait photography. Often it is desirable to capture the subject's eyes and face in sharp focus while allowing other less important elements to be rendered in a soft focus. At other times, portraits of individual features might be the focus of a composition such as the hands, eyes or part of the subject's torso.Additionally another style such as head shot has came out of the portraiture technique and has become a style on its own.
There are essentially four approaches that can be taken in photographic portraiture — the constructionist, environmental, candid and creative approaches. Each approach has been used over time for different reasons be they technical, artistic or cultural. The constructionist approach is when the photographer in their portraiture constructs an idea around the portrait — happy family, romantic couple, trustworthy executive. It is the approach used in most studio and social photography. It is also used extensively in advertising and marketing when an idea has to be put across. The environmental approach depicts the subject in their environment be that a work, leisure, social or family one. They are often shown as doing something, a teacher in a classroom, an artist in a studio, a child in a playground. With the environmental approach more is revealed about the subject.
Environmental pictures can have good historical and social significance as primary sources of information. The candid approach is where people are photographed without their knowledge going about their daily business. Whilst this approach taken by the paparazzi is criticized and frowned upon for obvious reasons, less invasive and exploitative candid photography has given the world superb and important images of people in various situations and places over the last century. |
Skip to Content
The Arts
The Arts banner
Wayang puppet playsBookmark
Learning area: The Arts
Year level: Year 3, Year 4
Country: Indonesia
In this learning sequence, students will learn about Javanese wayang shadow puppet theatre, its cultural importance, production and performance elements, as well as how the puppets are made and operated. Students will gain knowledge, understanding and skills about the different types of Indonesian puppets such as wayang kulit, wayang golek and wayang klitik.
Key inquiry questions
• What are the origins of wayang and how culturally important is the theatre form in Indonesia?
• What are the performance elements of wayang theatre?
• How are the puppets constructed and operated?
Puppet master manipulating wayang kulit puppets during a shadow-play performance in JakartaWayang kulit puppets being manipulated in a shadow-play in Jakarta
Image: Wayang kulit puppets by flydime (CC BY 2.0)
Related resources
Activity 1: Wayang puppets and performance
In this activity, students will:
• view images of wayang puppets
• investigate the performance and design of the puppet theatre
• create a physical or digital poster of wayang puppets.
Key inquiry question: What are the various elements of wayang puppet theatre?
About wayang shadow puppet theatre
1. Read the notes to the class about the wayang shadow puppet theatre (below).
2. Ask students make notes about what they already knew and what information was new and interesting. Ask students share their notes with another student.
3. Ask students to examine the images of different wayang puppets.
4. Ask students develop a physical or digital journal or poster with the names of the puppets.
5. Show the video, The Wayang Puppet Theatre:
6. Ask students to describe what they found out about the puppet theatre.
7. Have the whole class design 12 questions that explore aspects of wayang puppet theatre, including puppets, performance and design.
8. Divide students into groups of four and find the answers to three of the questions.
9. Students share their group's answers with the rest of the class and discuss what they liked best about the puppet theatre.
About wayang puppetry
Wayang kulit
Kulit means skin or leather. A wayang kulit puppet made of skin or leather is the most popular form for wayang puppet theatre. The performance combines music and drama and is a celebratory ritual involving complex elements of Hindu, Islamic and Indigenous Javanese religions.
Puppet design
Wayang kulit puppets are made from finely carved and decorated wooden rods and buffalo hide. The face and the feet of the puppet provide a side-on view while the body is viewed front-on. The puppets are posed with the bodies held rigidly upright. The only moving parts are the arms, shoulders and elbows.
Puppet features
The features of the puppets display good traits that are valued by the Indonesian people such as loyalty, courage, purity, wisdom, compassion and emotional control. The characters face certain trials in which these traits are tested. The colours of the puppets have symbolic meanings. The colours indicate an emotion or attitude: gold for dignity and calmness, red for tempestuousness, black for anger and white for innocence.
Varieties of wayang
Each region of Indonesia represents their puppet forms quite differently. These include:
• wayang klitik – flat, wooden, carved and painted puppets that perform on a stage
• wayang golek – three-dimensional, costumed, wooden rod puppets that perform on an open stage
• wayang beber – illustrations on long scrolls that are unrolled by the puppet master, dalang, as he recites the story and chants
• wayang wong/orang – dance and drama performances that involve live actors who dance and sing, and talk
• wayang topeng – dance and drama performances that involve live actors who wear masks.
Wayang stories
Wayang originated as a way of telling religious stories using elongated and stylised figures that did not represent human form. These stories originate from the Ramayana, an ancient epic Hindu poem dating back 2,000 to 3,500 years ago in India. The main character is Rama, who is an ideal reincarnation of the God Vishnu. The stories of the Ramayana celebrate the triumph of good over evil and each character is tested to make moral choices.
Favourite stories include:
• Rama's marriage to Sinta
• their banishment to the forest together with Rama's brother, Laksmana
• Sinta's abduction by the monster king Rahwana and her rescue, with the help of the monkey king, Hanuman
• escaping from the kingdom of Sri Lanka.
Wayang stories have a strong influence on people and are said to protect them from evil power and offer moral and spiritual strength.
Music played during wayang performances
The gamelan is the traditional music of Indonesia and is used for traditional dances, shadow plays and sacred temple ceremonies.
The gamelan orchestra accompanies dalang, who manipulates the puppets from behind the screen. The orchestra is on the same side of the screen providing continuous music appropriate to each scene.
Gamelan means 'to hammer'. It is a form of percussive music. The musicians use wooden and padded mallets to hit bronze key instruments to make different levels of sound for two different tunings, quite different in character, named slendro and pelog.
The instruments also include double-headed drums and bamboo flutes. The drummer and the 'gender' player have unspoken communication with the dalang to coordinate the visual and musical elements of the performance. Gender refers to an instrument that accompanies wayang performances.
Changes in tempo and volume accompany the events in the performances to build the drama of the story and hold the attention of the audience.
Activity 2: Performing and producing a wayang play
In this activity, students will:
• learn how to develop characters
• write and perform a play.
Key inquiry question: How do you create and perform a wayang play using the appropriate dramatic conventions and design elements?
Create and perform a play
1. In groups, have students read the wayang play (below), Cicakand Kancil. Cicak is a lizard and Kancil is a smart, sly mouse deer.
2. Follow this by having them explore the interactive digital object Indonesian Online: Wayang kulit. You need to login to Scootle to access this resource.
3. A puppet master, dalang, is then nominated. The dalang will conduct the puppet show and designate other jobs to the group members. This could include characters, musicians, prop makers, a storywriter or light controller.
4. In groups, students decide what their play is going to be about. This could be a story from the Ramayana. In this case students will have to write their own script. Or they could choose the traditional tale Cicak and Kancil. Each member of the group and their character should have a speaking part.
5. Developing characters:
• Guide students in developing an appropriate voice for their character that is recognisable by the audience.
• 'Bad' characters should speak slowly in a deep voice and should be accompanied by deep, slow music whenever they appear in the production.
• 'Good' characters have a higher pitched voice and are accompanied by music that is faster and lighter.
• Both characters are exaggerations or stereotypes of 'good' and 'bad'.
• A single voice or a chorus of voices can be used to produce the accompanying music.
6. Rehearse the production repeatedly so that the group can acquaint themselves with the script, timing of their entrances and exits, the interactions with other characters and their movements and gestures.
7. Rehearse the music accompaniment and how it can make the story more impactful for the audience.
8. As a group, students should share their ideas with the rest of the class and explain the decisions they made to create a dramatic puppet production. Have the class suggest ideas for improvement.
9. Develop a design for the theatre stage, props and audience area. The most important area is the screen and the light that shines behind the screen. The size of the puppets is controlled by how close and far they are from the light. The further away they are, the less detail the audience will see.
10. Construct the props, stage, lighting, audience areas and music.
Script for Cicak and Kancil
Below is a scripted version of the Indonesian folktale Cicak and Kancil.
Characters: Narrator, Kancil, Cicak, Cicak Number Two, Cicak Number Three
Props: percussion instruments, cut-out palm trees and houses, camera flash bulb
In the play three asterisks (***) indicate a good place for music or sound effects.
Note: A bemo is a three-wheeled vehicle used for transporting people.
Narrator: This is the story of Cicak and Kancil. Cicak is a gecko. A gecko is a type of lizard with sticky pads on its toes. *** Cicak can walk or hang upside down on ceilings and walls.
Kancil is a smart and sly mouse deer.
One day Kancil was resting in his house. He was fast asleep when Cicak, the gecko, tried to catch a spider on the wall. Cicak jumped. *** Cicak missed the spider *** and knocked a picture down. The picture hit Kancil on the head. ***
Kancil: Ow! You stupid Cicak! Look what you have done!
Cicak: Oh, Kancil, I'm sorry to disturb you. If you hadn't been so big and slow you could have moved out of the way in time.
Kancil: Slow! Me! I'll have you know I'm much faster than you Cicak. Your silly legs couldn't run fast at all.
Cicak: I'm not slow! I'm sure I'm much faster than you could ever be.
Kancil: All right then. I challenge you to a race to prove who is the fastest. We will race to the big mango tree and back here at sunrise tomorrow. The winner will have the right to do anything he likes to the loser, even kill him!
*** (drumroll)
Kancil: Do you agree?
Cicak: Oh, Oh, Um. Yes, yes I do.
Narrator: Kancil went off to rub coconut oil into his legs and to rest for the night. But Cicak was in a state of panic. ***
Cicak: Oh dear. What have I done? Kancil is much faster than me. If he wins he will probably kill me. *** I must think.
(He walks up and down.)
Cicak: I've an idea! *** I'll get my friends to help me.
Narrator: First Cicak called one friend, *** then another. *** They decided to trick Kancil by hiding along the track of the race so that instead of one Cicak, three Cicaks would run parts of the race like a relay. But Kancil would think it was one gecko. ***
(Geckos leave.)
Narrator: The following morning when the sun rose, *** Kancil and Cicak lined up next to Kancil's house.
Kancil: Are you ready? Are you steady? Go.
Narrator: The both started running and Kancil sped off ahead. *** (Cicak and the house drop back.)
Kancil: Ha, ha. I'm going to beat Cicak easily. Then I might not kill him, but I'll make him my slave forever. ***
(During this time several coconut palms go past.)
Narrator: Kancil ran along and passed a tourist who wanted to take his picture. ***
(Kancil skids to a halt and there is the flash of a camera.)
Narrator: Then he saw Cicak run around a corner ahead of him. It was really Cicak Number Two.
Cicak Number Two: You'd better hurry if you want to beat me, Kancil. ***
Kancil: I'd better run faster. *** There goes Cicak.
(He runs faster – more coconut palms go past.)
Narrator: Kancil runs faster. *** He passed a bemo full of people going to the market. ***
Kancil: I'm going to beat Cicak now.
Narrator: But as Kancil sped onto the mango tree at the halfway point in the race he saw Cicak – Cicak Number Three – running back from the tree. ***
Cicak Number Three: You're pretty slow today, Kancil. *** (He runs off.)
Kancil: Cicak is really fast! I'd better speed up. ***
Narrator: So Kancil raced as fast as he could.
*** (Trees and buildings go past.)
Narrator: His little house was in sight!
Kancil: I will win now for sure! Puff! Puff!
Oh no! There is Cicak just running to my house. ***
Oh no! He has won.
Narrator: Cicak had decided not to be nasty to Kancil, because if anyone found out how the cicaks had tricked Kancil they would be in big trouble. So he said …
Cicak: Kancil, I don't want anybody to know that we cicaks can run so fast or all the animals would be challenging us to races all the time. So my reward for winning will be that you let us cicaks live inside your house to catch insects there, and you mustn't tell anyone about the race.
Narrator: So from that day to this, cicaks live inside the houses in Bali and catch insects, while kancils are very shy and don't like to talk to the animals.
Activity 3: Designing a wayang puppet
In this activity, students will:
• learn about the design and decoration of wayang puppets
• make their own puppets
• perform a play.
Key inquiry question: How are wayang kulit and wayang golek puppets made and used in a performance?
Make a puppet
Students make wayang puppets according to the instructions below. Ask them to decide whether they will make a wayang kulit or wayang golek puppet and choose the appropriate instructions.
Wayang kulit puppets
• heavy duty cardboard
• gold, black, white, red paint
• scissors and/or paper knives
• textas for outlining
• something to punch holes through the card, for example, hammer and nail on a block of wood if supervised, or a large eye blunted needle, or a sewing machine with a large needle
• wayang kulit templates.
1. Trace puppet outline using the template.
2. Use it as a stencil on a piece of cardboard to cut out a sturdy version.
3. Mark in major lines using a felt pen.
4. Punch holes along all lines to create dimension within the shadow.
5. Colour both sides of the puppet. Pay attention to the face colour.
6. Make arm segments and join using wing clips.
7. Attach arm segments to the body using wing clips.
8. Attach pieces of dowling rod or other stick-like objects to the hands to manipulate the arms.
9. Attach a thicker piece of dowling rod or long ruler to the length of the puppet body with sufficient length at the bottom to hold the puppet comfortably so the hand is out of sight during the performance.
Wayang golek puppet
• 1 litre milk cartoons
• good paint
• black felt
• sequins, braid
• fringing, string
• A4 paper
• two pencils
• string, cardboard
• white cotton cloth
• edicol dye
• foam blocks for printing patterns
• foam ball
• papier mâché materials and glue
• white and black paint
• black felt-tip pens
• foam ball
• sticky tape and elastic bands
• sticks
• strips of cardboard as a crown to fit around foam ball head
• coloured paper
Body: Paint the milk cartons gold, ensuring complete coverage.
1. Paint sheet of A4 paper gold, ensuring complete coverage.
2. When the sheet is dry, cut it in half and roll diagonally round each pencil. Glue the paper and remove the pencil.
3. Cut hand shapes out of cardboard.
4. Attach string to hand, thread the string through the two arm rolls and attach the string near the top of the milk carton.
5. Repeat with the other arm.
1. Make papier mâché nose and glue to the foam ball.
2. Paint the head, using white paint for the face and black paint for the hair.
3. Use fine black felt-tip pens to draw on the eyes, nose, eyebrows, mouth and ears.
4. Other decorations may be added such as a moustache or curls.
1. Paint strips of cardboard and leave to dry.
2. Cut out triangle shapes from coloured paper: two small and one large.
3. Measure the head of the puppet and glue the strip of cardboard to make a crown.
4. Glue the triangles onto the crown.
5. Glue headpiece to head.
Yoke: Cut yokes from black felt and decorate with sequins, fringing and braid. These should be decorated in symmetrical patterns rather than randomly placed.
1. Dye cotton cloth earthy colours. Tea or edicol dye can be used.
2. Cut rectangles of cloth large enough to dress the puppet.
3. Cut foam blocks into a number of different shapes and, using gold and black paint, print patterns onto pieces of cloth.
1. Assemble all parts of the puppet using sticky tape and glue.
2. Push a stick through the milk carton and head.
3. Wind an elastic band around the neck to prevent it from pushing though.
4. Tape sticks to the hands.
Create a performance
1. Prior to creating a performance, students design an aerial view of the performance space and include labels where the audience sits, props are stored, the orchestra performs, and the light is distanced from the screen.
2. Students may wish to advertise their performance for others classes to come and see it.
3. Students could design an advertisement, either for the internet or as a poster or handout.
4. Students rehearse their play a number of times to perfect and refine the performance.
5. Perform the play for an audience.
6. Following the performance, students reflect on and evaluate their parts and how they played it.
Image and text: Illustrations by Xiangyi Mo from Access Asia Primary teaching and learning units – Wayang plays: Variation on a theme, pp. 53-55. © Commonwealth of Australia
Activity 4: Reflection
In this activity, the class develops a blog where all students can upload their designs for the performance and photographs or film of the production.
The blog provides an opportunity for other students to question the performers on the intended representation of their puppet character and how they interpreted voice, expression and other production elements.
The blog will reveal students' assumptions about the activity and how others agreed or disagreed with the way they addressed the task.
Students write their own reflection about the performance within the group and their success in designing an authentic puppet and other production elements.
This learning sequence examines the Javanese forms of wayang golek and wayang klitik, and the Balinese and Javanese forms of wayang kulit. Wayang is a Javanese shadow puppet theatre integrating elements of religion, social customs, visual and performing arts, and storytelling.
Students will write a wayang play, make a shadow puppet that reflects an understanding of wayang characterisation and perform the play. They will develop the skills to effectively search the internet, using appropriate phrases, for websites that provide information on the different types of Indonesian puppets.
As an arts learning sequence for Drama and Visual Arts, these integrated activities incorporate knowledge, understanding and skills integrated so that students can explore the subject matter through questioning and acquiring knowledge about the subject.
Students use this knowledge to develop designs and options for creating and constructing both the puppet and the theatre performance. Their designs and performance should be creative, either emulating traditional designs or developing their own. Teachers should explain to students about being respectful of the stories, symbols and traditions of other cultures.
Activity 1: Wayang puppets and performance
In this activity students should be introduced to the traditional forms of puppet theatre: wayang kulit and wayang golek. Refer to information contained within the resource. Through questioning, establish what the students already know and can do.
Activity 2: Performing and producing a wayang play
Introduce contextual information about wayang puppetry and have students use the activity resources. Refer to information about wayang plays to explore their options for designs of the puppets and the performance elements.
Activity 3: Designing a wayang puppet
Prepare students with information about drama and visual arts skills needed to complete the task. For example, the elements of drama to be considered for this task include story script, theatre construction, voice (or voices), role, movement and positioning of puppets, interactions between the characters and the audience, sound, lighting, props, timing.
In the design refer to the information contained within the resource about making puppets so that students can consider creative ideas, materials, techniques, technologies and visual elements. Have students work in small groups and assign particular tasks for the group to be responsible for the construction and performance of the play.
Activity 4: Reflection
It is important that students are provided the opportunity to reflect on what they have learned about wayang theatre through their participation and give evaluative feedback through a blog.
Useful websites
The three websites listed will assist teachers to explore the history, culture and arts forms of Indonesian wayang shadow puppets. These websites can be used for reference material, in accessing information about the performance and how to build a wayang puppet. The interactive games are great for students to sequence and storyboard their ideas.
• Asian Art Museum: Making Indonesian Rod Puppets (lesson) – This site provides a summary of the Ramayana or a scene from this Hindu epic, identifies the different puppet character types, and shows how to analyse the role of the puppet master in Indonesian rod puppet theatre and how to construct a rod puppet of a character from the Ramayana or the Mahabharata.
• Scootle: Indonesian Online – Wayang Kulit – This interactive learning object provides instructions about how to create a puppet performance. You need to login to Scootle to access this resource.
It is recommended that teachers preview websites to ensure they are suitable for their students prior to use in class. Content accessed via these links is not owned or controlled by Asia Education Foundation and is subject to the terms of use of the associated website.
The full resource can not be displayed on a mobile device.
back to top |
Celebrating the accomplishments of women
Karen S. Spangler
Managing Editor
When you think about the many women who have made contributions to the history of the military, our country and our world, where do you even begin?
Reflecting back on the presidential campaign of 2008, Hillary Clinton shattered the glass ceiling when she ran a strong campaign in her bid for the Democratic nod for the presidency. Although Clinton was defeated, she holds one of the most powerful positions in the country today as the secretary of state.
However, she was not the first woman to aspire to the high offices of the presidency/vice-presidency. In 1984, presidential candidate Walter Mondale selected Geraldine Ferraro as his running mate. The MondaleFerraro ticket was defeated by incumbent President Ronald Reagan and Vice President George H.W. Bush.
But did you know that back in 1870, Victoria Woodhull became the first woman to run for the presidency? Rather a controversial figure for her time, Victoria lost the election which she ran against Grover Cleveland and incumbent President Benjamin Harrison.
Where would women be today without the determination and efforts of Susan B. Anthony, the Napoleon of the women’s suffrage movement? Without Clara Barton, would there be a Red Cross? And where would the Girl Scouts be without Juliette Low?
Through the decades, women have marched across the pages of history, making contributions in politics, the arts, education and medicine that have changed the world in which we live.
Many of their accomplishments have occurred thousands of feet above the earth. Amelia Earhart was a pioneer for women and aviation, noted for her solo flights. Amelia and her co-pilot, Fred Noonan, disappeared on a flight from New Guinea to Howland Island in the Pacific in July 1937.
Lt. Barbara Allen Rainey earned her wings and became the first female U.S. naval aviator in 1974.
Capt. Sunita Williams, a naval aviator and NASA astronaut, conquered space in 2007 when she set the record for the longest uninterrupted space flight by a female astronaut.
During World War II, a group of young women became pioneers in the aviation industry by forming what was known as the Women Airforce Service Pilots or WASPs.
Those women are now looked upon by many people as heroes and role models because they were the first women in history trained to fly American military aircraft. Because of the WASP services, several thousand of their male counterparts were freed for combat operations.
Maj. Gen. Jeanne Holm, at one time director of the Women in the Air Force (WAF), was the first female one-star general in the Air Force and the first two-star female general in the armed forces. She was promoted to brigadier general July 16, 1971, the first female Airman to be appointed in this grade. She was promoted to the grade of major general effective June 1, 1973, with date of rank July 1, 1970 – the first woman in the armed forces to serve in that grade.
Betty Gillies was the first woman pilot to qualify for the Women’s Auxiliary Ferrying Squadron and Sgt. Vanessa Sheffield became a C-130 Hercules maintainer back in the ’70s when there weren’t many women in the maintenance career field.
Capt. Joy Bright Hancock, a veteran of two world wars and director of the Women Accepted for Volunteer Emergency Service (WAVES) from 1946 to 1953, played a significant role in the passage of the Women’s Armed Service Integration Act.
Cmdr. Elizabeth Barrett became the first female line officer to hold command in a combat zone in 1972 when she became commanding officer of the Naval Advisory Group in Saigon. Lt. Cmdr. Darlene Iskra became the first women to command a Navy ship in 1990 and in 1998, Cmdr. Maureen A. Farren became the Navy’s first female combatant ship commander.
Ships have been named after notable women in history and for esteemed Navy women. The first warship named for a woman by the USN and the first USN ship so named to take part in combat operations was USS Higbee (DD 806) in 1945, named for Lenah S. Higbee, superintendent of the Navy Nurse Corps during 1911-1922.
The guided missile destroyer, USS Hopper (DDG 70) “Amazing Grace” was commissioned on Jan. 6, 1996 at Bath Ironworks in Bath, Maine. Hopper, home-ported at Joint Base Pearl Harbor-Hickam, Hawaii was named after Rear Adm.
Grace Murray Hopper who was one of the pioneering spirits in the field of computer technology, and led the Navy into the computer age. This is only the first time since World War II and the second time in the Navy’s history that a warship has been named for a woman from the Navy’s own ranks.
Women were first assigned to some non-combatant ships in 1978 and in 1994, their service was expanded to include combatant ships. In 2010, the Navy announced a policy change that would allow women to serve on submarines.
The accomplishments of women throughout history have opened doors, broken barriers and ushered in opportunities for not only women, but everyone.
We celebrate the contributions they have made and are thankful for them.
And we know that the women of today and the future will continue to shatter those glass ceilings and make the world a better place.
Share and Enjoy:
• Print
• Facebook
• Twitter
• Google Bookmarks
• email
• RSS
Category: Window on Joint Base Pearl Harbor-Hickam |
Jews in Medieval England
Jews in Medieval England
Medieval Moneylending
A king had a couple of options when on a quest for funds. One, he can tax his people. Edward certainly did that. Two, he can confiscate funds from those over whom he wields power. I blogged earlier about what he did to Jewish coinsmiths in 1278 ( Henry VIII had the great plan of starting his own religion and confiscating the wealth of the Catholic Church. That was a little more radical than Edward, who often relied on the third method, money lending.
But then came the Italians:
The power that these families wielded can be seen in the following explanation from Wikipedia regarding John Peckham, the Archbishhop of Canterbury during Edward’s Welsh wars:
“Peckham laid stress on discipline, which often resulted in conflict with his clergy. His first episcopal act was calling a council at Reading in July of 1279 in order to implement ecclesiastical reform, but Peckham’s specifying that a copy of Magna Carta should be hung in all cathedral and collegiate churches offended the king as an unnecessary intrusion into political affairs. Another ruling was on non-residence of clergy in their livings. The only exception Peckham was prepared to make on non-residence was if the clerk needed to go abroad to study.At the Parliament of Winchester in 1279, the archbishop compromised and Parliament invalidated any regulation of the council dealing with royal policies or power. The copies of Magna Carta were taken down. One reason the archbishop may have backed down was that he was in debt to the Italian banking family of the Riccardi, who also were bankers to Edward and the pope, and Peckham was under threat of excommunication from the pope unless he repaid the loans.”
The First Crusade
The Crusades, Christendom’s attempts to win back the Holy Land and Jerusalem, began in 1095 with the First Crusade. The Muslims had taken Jerusalem in 1076.
Pope Urban incited the Christians of Medieval Europe with the words: “Christians, hasten to help your brothers in the East, for they are being attacked. Arm for the rescue of Jerusalem under your captain Christ. Wear his cross as your badge. If you are killed your sins will be pardoned.”
The Crusaders had to follow an overland route to Constantinople, where they gathered in preparation for moving south to Palestine. By 1097, after a brutal journey to reach it, nearly 10,000 people had gathered in Constantinople.
The Crusaders encountered little resistance for the most part, and reached Jerusalem by June 7, 1099. They began their attack on the 13th, and by the 17th, had slaughtered every Muslim in the city. They established the Kingdom of Jerusalem and held it for nearly 100 years.
By 1187, however, “Saladin had enough of broken treaties, renegade Crusader Princes’ (see Reginald of Chatillon) attacking Arab caravans and the harassment of his people. Saladin’s army started a march on Jerusalem. His army met up with King Guy [de Lusignon] at the Horns of Hattin on July 4th, 1187. Guy was poorly advised. He was greatly outnumbered but he attacked, and after a long, bloody battle, was taken prisoner. Balian of Ibelin was also captured at this time, but begged permission to return to Jerusalem to look after his ailing wife, the former wife of Amaury. Saladin wasn’t heartless, and allowed Balian to go.
Balian arrived in Jerusalem to find chaos. He placed himself in charge, as he was the highest ranking officer. He then proceeded to fortify the city in preparation for a possible siege. Saladin arrived at the Mount of Olives on September 26th. Balian held the city till September 30th, when he and Saladin finally agreed to come to terms and Balian surrendered the city to Saladin. The Crusaders left the city of Jerusalem, their capitol, to the armies of Saladin, thirty days later.”
An associated aspect of the Crusades was the attack on European Jews along on the way. One account of a massacre in Germany reads: “As soon as the enemy came into the courtyard they found some of the very pious there with our brilliant master, Isaac ben Moses. He stretched out his neck, and his head they cut off first. The others, wrapped by their fringed prayingshawls, sat by themselves in the courtyard, eager to do the will of their Creator. They did not care to flee into the chamber to save themselves for this temporal life, but out of love they received upon themselves the sentence of God. The enemy showered stones and arrows upon them, but they did not care to flee, and [Esther 9:5] “with the stroke of the sword, and with slaughter, and destruction” the foe killed all of those whom they found there. When those in the chambers saw the deed of these righteous ones, how the enemy had already come upon them, they then cried out, all of them: “There is nothing better than for us to offer our lives as a sacrifice.” [The outnumbered Jews had no chance to win: Emico is reported to have had about 12,000 men.]
The women there girded their loins with strength and slew their sons and their daughters and then themselves. Many men, too, plucked up courage and killed their wives, their sons, their infants. The tender and delicate mother slaughtered the babe she had played with, all of them, men and women arose and slaughtered one another. The maidens and the young brides and grooms looked out of the Windows and in a loud voice cried: ‘Look and see, O our God, what we do for the sanctification of Thy great name in order not to exchange you for a hanged and crucified one….'” |
Early diagnosis to avoid blindness for babies
EMBED </>More Videos
Dr. Chiang wants eliminate two obstacles to early diagnosis: accessibility to experts and a lack of standardized tests. (KFSN)
Smaller and more premature babies are surviving than ever before. That's leading to a rise in the number of cases of retinopathy of prematurity, or ROP. It's a blinding eye disorder that the National Eye Institute says affects as many as 16,000 preemies in the US every year. Stevie Wonder was born six weeks too early and went blind. There is a doctor in Oregon who is pioneering ways to keep these babies from going blind.
Samuel and Henry Bowen were born at 23 weeks and weighed less than two pounds each. Their parents had never heard of ROP before the twins were diagnosed with it.
"There are so many things that could potentially happen in the beginning especially for babies that early that eyesight and blindness wasn't even something that we'd thought about yet," said Michael Bowen, the twins' dad.
"The blood vessels have number one, gotten thicker, and they've gotten torturous, meaning wiggly," explained Michael F. Chiang, MD.
The image of Henry's eye at 34 weeks showed aggressive ROP. Untreated, it could detach the retina and blind him.
Dr. Chiang, Pediatric Ophthalmologist with Elks Children's Eye Clinic at Oregon Health & Science University, is leading the charge for early screening and treatment of ROP.
Instead of using traditional laser or cryotherapy, he injected Henry's eyes with Avastin.
"In the course of a week, it basically reversed itself. If you diagnose it early enough that you can treat it, prevent a baby from going blind for their entire lifetime, we've got to make that diagnosis correct, we've got to make it on time," said Dr. Chiang.
Dr. Chiang is trying to eliminate two obstacles to early diagnosis: accessibility to experts and a lack of standardized tests. He's creating a telemedicine solution.
"They would take a picture, send it to us and we could look at it and we could have our computer systems that we're developing analyze those images and try to make a better diagnosis," Dr. Chiang shared.
The Bowens are grateful for their boys' early diagnosis.
Samuel's eyes improved on their own, and Henry's checkups have been good.
"He's still not out of the woods yet, but from where it was before to where it is now is a big difference," said Bowen.
Henry may still need laser therapy when he's bigger. And both boys may still be severely nearsighted. Still, there were no successful treatments for ROP until the late 80's and even today they sometimes fail. Dr. Chiang gives a lot of credit for his work to the Oregon State Elks, which helped fund his research.
Related Topics:
healthhealth watch |
Further Evidence That Ignorance is Hard to Dislodge
Political scientists — not to mention politicians — have for decades been preoccupied with the question of how citizens come to believe what they do, why they are so easily led astray by false stories, and what can be done to correct this when it occurs.
An interesting new study out of Duke points out just how complicated it can be to correct false beliefs — particularly in the chaos of an election-season media environment.
From the study’s press release:
The researchers gave 50 Duke undergraduate students a 120-question test on basic science information, with questions including: What is stored in a camel’s hump? How many chromosomes do humans have? What is the driest area on Earth? After answering each question, students rated their confidence in their response, and then received the correct answer as feedback. Half the students were retested six minutes later, while the other half were retested one week later.
Students who were retested immediately corrected 86 percent of their errors. As expected, their responses showed a hypercorrection effect — they were more likely to correct errors that they had made with high confidence relative to low-confidence errors.
In contrast, students who were retested one-week later also showed a hypercorrection effect. However, these students only corrected 56 percent of their errors, indicating they had forgotten many of the correct answers that they had learned from the feedback.
When students forgot the correct answer over the one-week delay, the opposite of the hypercorrection effect occurred — the higher their confidence in their initial error, the more likely they were to re-produce that same error on the final test.
It’s hard not to read this as a blow to the ambitions of sites like Media Matters and FactCheck.org, especially when you take into account how the average American consumes their political media.
If Teddy, a somewhat representative American consumer of political news and opinion, has long believed that Obama raised his taxes, and has long been confident in this belief — why wouldn’t Obama raise taxes, after all? That’s just what those Democrats do! — then any correction of this belief may well prove to be temporary. It’s not as though Teddy will be seeking out debunkings of his beliefs, so if he happens to stumble upon one it will likely quickly be swamped by his usual diet of conservative websites.
So it’s not just a matter of correcting false information. It has to be done in a very precise, intelligent way, and I don’t think anyone has yet mastered this science. Andrew Butler, the lead researcher of the Duke study, notes, “If students practice retrieving the correct information, then they may be able to avoid reverting back to their deeply entrenched false knowledge.”
Might not work in a political communications context — what are you going to do, tell Teddy that Obama didn’t raise his taxes and then ask him to write that fact on a blackboard a hundred times so it sinks in?
Jesse Singal
|
Obama Signs Bill to Extend Kids Meal Programs
President Obama today signs the Healthy, Hunger-Free Kids Act of 2010. The law is designed to improve the quality of meals served in schools and to fund better out-of-school nutrition programs. The signing ceremony is set for the Harriet Tubman Elementary School in Washington D.C.
Thousands more children would eat lunches and dinners at school and all school food would become more nutritious under a bill President Barack Obama signed into law Monday, part of an administration-wide effort to combat childhood obesity.
"At a very basic level, this act is about doing what's right for our children," Obama said before signing the bill. The ceremony was moved from the White House, where most signings are held, to an elementary school in the District of Columbia to underscore the point.
Besides Obama, the bill also was a priority for his wife, Michelle, who launched a national campaign this year against childhood obesity.
"We can all agree that in the wealthiest nation on earth all children should have the basic nutrition they need to learn and grow and to pursue their dreams," said Mrs. Obama. "Because in the end, nothing is more important than the health and well-being of our children. Nothing,"
The $4.5 billion measure increases the federal reimbursement for free school lunches by 6 cents a meal at a time when many school officials say they can't afford to provide the meals. The bill will also expand access to free lunch programs and allow 20 million additional after-school meals to be served annually in all 50 states. Most states now only provide money for after-school snacks.
The new law aims to cut down on greasy foods and extra calories by giving the government power to decide what kinds of foods may be sold on school grounds, including in vending machines and at fundraisers. While the government has long had nutrition requirements for the free and reduced cost meals it subsidizes, the bill would expand those requirements to cover all foods sold during school hours. It does not apply to after-school events.
Bake sales and other fundraisers that don't meet the new nutritional requirements would be allowed during the school day as long as they are infrequent. The language in the bill is broad enough that a president's administration could even ban bake sales, but Agriculture Secretary Tom Vilsack has said that he does not intend to do that. The USDA has a year to write rules that decide how frequent is infrequent.
Public health advocates pushed for the fundraising language, saying they are concerned about daily or weekly fundraisers that allow children to frequently substitute junk food for a healthier meal.
Many Republicans, including former Alaska Gov. Sarah Palin, have criticized the effort and the fundraiser limits in particular, saying the bill is too expensive and an example of government overreach.
Supporters say the law is needed to stem rising health care costs due to expanding American waistlines and to feed hungry children in tough economic times. Mrs. Obama cited a group of former generals and military officials who have said unhealthy school lunches are a national security threat because weight problems are now the leading medical reason that recruits are rejected.
She said it is ultimately the responsibility of parents more than anyone else to make sure their children eat right and get enough exercise, but that government has a role to play, especially when children spend so much of their time each day at school and when many of them get up to half their daily calorie intake from eating school meals.
"It's clear that we, as a nation, have a responsibility to meet as well," she said. "We can't just leave it to the parents. I think that parents have a right to expect that their efforts at home won't be undone each day in the school cafeteria or in the vending machine in the hallway."
The new nutrition standards would be written by the Agriculture Department, which would decide which kinds of foods may be sold and what ingredients can be used in school cafeterias and vending machines.
Popular foods like hamburgers and pizza will likely stay on school lunch lines but become healthier, made with leaner meat or whole wheat crust, for example. Vending machines could be stocked with less candy and fewer high-calorie drinks.
|
rainbow salad
RAINBOW SALAD : A HEALTHY LUNCH 1024 1024 Delphine Remy | Holistic Nutrition & Eating Psychology Coach
Eat healthy today by preparing my Rainbow Salad for lunch. This recipes takes a few minutes to prepare and calls for ‘eating the rainbow’ — literally. What does it mean to eat the rainbow? Eating the rainbow means eating plenty of colorful fruits and veggies to ensure we our providing the body with the necessary nutrients it needs to function and maintain optimal health. Each colorful fruit or veggie brings its own list of nutrients and benefits.
Eat the rainbow — WHAT TO EAT
Green fruits and veggies improve eye health, reduce the risk for certain chronic illnesses and cancers, and detox enzymes in the liver.
Nutrients include iron, calcium, potassium, vitamin k, folate, and magnesium.
Red fruits and veggies reduce the risk of stroke and heart disease and lower blood pressure.
Nutrients include lycopene, anthocyanin, ellagic acid, vitamin c, and quercetin.
Orange fruits and veggies are known to boost antioxidant intake, promote anti-inflammation and promote skin and eye health. Orange fruits and veggies are also great post-workout foods because they reduce muscle soreness and tension.
Nutrients include beta carotene, alpha carotene, potassium, vitamin c and vitamin a.
Blue and purple fruits and veggies are my favorite. They increase antioxidant consumption, promote heart health and lower blood pressure. They also support the immune system and act as a anti-aging skin care product. Blueberries are always something you can find in my fridge/freezer.
Nutrients include vitamin c, potassium and folate.
White fruits and veggies — there are white fruits and veggies? Yes. Garlic, ginger, cauliflower, mushrooms, potatoes and onions all made the list. While this list is not traditionally as tasty as the other lists — they are just as essential to the eating the rainbow process. White fruits and veggies serve to reduce the risk of cardiovascular disease and contain cancer fighting agents. They also support bone health and reduce the risk of osteoporosis. The help build the immune system and reduce free radical damage.
Nutrients include vitamin c, allium, sulforaphane, flavonoids.
Eat the rainbow — HOW TO EAT
Drink it! Mix and blend your favorite fruits and veggies into a delicious smoothie or juice.
Try my recipe: Mango Smoothie Bowl, Vibrant Green Smoothie, Pretty in Pink Smoothie Bowl, Avocado Kiwi Smoothie, Carrot, Orange and Ginger Juice.
Eat it! At each meal be sure to fill at least half your plate with a salad or veggies. Mix and match veggies at each meal so you’re eating at least 2 different ones each day.
Freeze it! Many fruits and veggies are seasonal so be sure to freeze your favorites and batch cook and meal plan for some of the recipes that include veggies.
Find more recipe videos on YouTube! Subscribe to my YouTube Channel to receive instant updates of new and fresh recipe videos by yours truly.
1 beet
1 purple carrot
1 yellow carrot
1 orange carrot
1/2 apple
1 cup white cabbage
1/2 cup pecans
1/2 cup mixed dried fruits
1/2 cup parsley
1/4 cup walnut oil
1. Let’s prepare all the veggies. Peel all the carrot, cut the apple in quarters and peel the beet.
2. Take your food processor out and shred all the veggies one after the other.
3. What a surprise when you open the food processor, a gorgeous rainbow!
4. Pick a nice salad dish, add all the veggies, the dried fruits.
5. Add the dried fruits, the roughly crushed pecans, 1/4 cup walnut oil, fresh ground pepper and sea salt.
Sharing is caring!
Leave a Reply
Your email address will not be published.
GOOD THINGS COME to those who read our blogs
|
Skip to main content
Seven Oceans or Seas in Hindu Scriptures
There is a concept of seven islands in Hindu scriptures. These seven islands are surrounded by seven oceans or seas. The seven seas in Hindu scriptures are:
Lavana (salt water)
Ikshu (syrup)
Sarpih (butter)
Dadhi (sour milk) (in some texts it is mentioned as curd)
Dughda (milk)
Svadhu (treacle)
Udaka (water)
In some Puranas the list is bit different, Sarpih is replaced by Sanpi; Dadhi is replaced by Dahi, Svadhu by Jala and Udaka by Rasa. In the list Lavana is salty, Iskhu is sour, Sanpi is bitter, Dahi is curd, Dughda is milk, Jala is water and Rasa is juice.
In a story mentioned in the Uttara Kanda of the Ramayana, a 100-headed demon named Satakantha lived in an island-city named Mayapura and the island was surrounded by Dadhi Sagara – sea or curds.
Interestingly, Rama and Sita travels through all the above said seas to reach the island of the demon.
This demon was killed by Mata Sita who took on the form of the ferocious Bhadrakali. |
05/18/2014 09:36 pm ET Updated Dec 06, 2017
If Godzilla Were Real, How Much Would He Eat?
The newest Godzilla is quite the beast. According to the official source, Legendary pictures, Godzilla is 355 feet tall. That's about the height of a 40-story building! It's also the tallest Godzilla yet (according to Wikizilla; yes, there are such sites). So, how much does such an animal need to eat to survive?
To answer that question we'll use Kleiber's Law: an animal's basal calorie requirement E (the least amount of calories needed to be eaten in a day to sustain life for a minimally active organism) is related to its mass M (in kilograms) by the equation
We need Godzilla's mass. There's no scale I know of that we could use, and I wouldn't be comfortable asking him directly. Maybe that's why Popular Mechanics took the easy way out and asked scientists to estimate some of Godzilla's features. The consensus on his mass: about 160,000 tons, or about as heavy as a cruise ship!
Okay, back to the calculation. Godzilla's mass in kilograms is 160,000,000 kg, making his daily calorie requirement roughly...
99,500,000 calories!
Maybe this explains why he's always eating everything in sight!
(And also why Hollywood -- and the original creator of Godzilla -- made him eat nuclear energy for food.)
Truth be told, I'm not sure how applicable Kleiber's Law is to Godzilla. It does, however, accurately describe the relationship of mass to energy requirements for everything from cells to elephants. That's a pretty amazing feat for just one equation. And, aside from the absurdly large appetite Godzilla has, it's the one other thing I hope you'll take away from this article. |
Nayak Rule in Madurai
Nayak Rule in Madurai began after the collapse of the Vijayanagar Empire in 1565. The Nayaks were originally the Governors of Madurai. To facilitate the smooth running of the empire, the Vijayanagar Rulers had appointed Governors for its different territories. Once the Vijjayanagar Empire began to disintegrate, the Nayaks of Madurai proclaimed themselves as rulers.
Madurai began to flourish under the Nayaks. Thirumalai Nayak was the most prominent amongst the Nayak rulers. He is credited with the construction of a number of structures in around the city of Madurai. Some of the architectural marvels built by him are the Thirumalai Nayak Palace, the Raja Gopuram (Main Tower) and Puthu Mandapam (The New mansion) of the Meenakshi temple. However, following the death of Thirumalai Nayak in 1569, the Nayak Dynasty started disintegrating. His successors were not as efficient as he was and slowly the neighboring states started invading. Chikka Deva Raya of Mysore, The Maratha ruler Shivaji Bhonsle and the Muslim rulers from north invaded Madurai, creating chaos and spreading panic among the people.
In this time of chaos, Rani Mangammal held forte and fought against the invaders. She was able to rule for around two decades, staving off attacks from the invading armies. Her courage and determination is been a source of inspiration for the people of Madurai even today.
Last Updated on 9/15/2011
EU GDPR Update:
We follow editorialcalls.org for border and boundary demarcations |
A modern lifestyle brand redefining motherhood
The Girl Scouts add 23 STEM and nature badges to encourage little leaders of tomorrow
For more than a century, the Girl Scouts of America has been empowering little girls. And now, through new Girl Scout badges announced this week, the organization is teaching girls that not only can they be awesome at cookie selling, but also in outdoor activities and STEM (science, technology, engineering, and math).
“Data shows Girl Scouts excel in life because of our innovative programming,” CEO Sylvia Acevedo said in the public announcement. “So we’ve expanded our offerings to include even more engaging, fun, and impactful activities for girls of all ages—including Daisies as young as 5 years old.”
And that encouragement goes a long way: Data collected in the recent Girl Scout Impact Study found kids in the program are already almost twice as likely as peers to participate in professions where women are traditionally underrepresented—and adding more STEM to the mix can only help.
The rollout of 23 new badges—in both STEM and the outdoor skills the organization is known for—marks the largest programming rollout for the Girl Scouts in almost 10 years. It also comes as the organization debuts it’s new digital platform for volunteers, which promises to make things easier for all the Scout-leading mamas out there.
With the addition of the new STEM badges, Girl Scouts will be designing robots and race cars and creating algorithms in addition to honing the more traditional skills like hiking and first aid.
Organizations including the Society of Women Engineers collaborated on the new badges, which is so cool when you think that some of the the Girls Scouts of today will grow up to join those ranks.
“Simply put, Girl Scouts is on the cusp of a leadership renaissance for girls,” said Acevedo, who hopes to see not just more girls, but more mothers, too, join the organization.
As she said, “We’re always looking for more go-getters, innovators, risk-takers, and leaders to enhance our ranks.”
Comments20x20 ExportCreated with Sketch.
Who said motherhood doesn't come with a manual?
Already a subscriber? Log in here.
1. It changes brain structure in important ways
2. Play activates the entire neocortex
3. It teaches children to have positive interaction with others
4. Children who play are often better students
5. Unstructured play gets kids moving
1. People Blocks Zoo Animals
You might also like:
1. Gail Simmons
You might also like:
Dana Dewedoff-Carney has a beautiful family. On paper, she's a mom of three. But in her heart, she has five children. She's had two miscarriages, one last year at five weeks, and another this past summer.
"I lost our son in June. I was 14 weeks pregnant, but he had passed away at 12," she tells Motherly, explaining that she and her husband had already named their boy Benjamin.
He never got a chance to live in this world, but he is changing it. His mama is the force behind Project Benjamin, a photo series that is going viral and changing the way people talk about pregnancy and infant loss.
Dewedoff-Carney started Rise for Women, a New Jersey-based organization dedicated to empowering women and connecting them with the resources they need to thrive. Rise for Women was born out of a painful time for Dewedoff-Carney. She was a single mom of three, and she was struggling, although from the outside she looked fine.
After launching Rise for Women Dewedoff-Carney created the hashtag #StruggleDoesNotHaveALook, which took on a whole new meaning this year after she and her now husband lost their babies. She came up with another hashtag, #TheyMatterToo, to remember them, and invited other moms to join in a photo session.
Each mother had her portrait taken with a chalkboard bearing a phase that someone told her after her miscarriage.
In Dewedoff-Carney's case, a doctor who perhaps meant to be kind told her the baby she lost "was the wrong baby." Other women in the photo series were told they could always adopt, or that they should be happy with the children they already have. Dewedoff-Carney says sometimes people don't realize how much their words cut those suffering a loss.
"I know people are not saying these things to be malicious and hurt us, but if they could just be a support and say, 'I am so sorry for your loss, I'm here for you,' that is so helpful," she explains.
Experts agree. Jessica McCormack is a licensed marriage and family therapist in private practice at The Self Care Path in Burr Ridge, Illinois. She says parents who've suffered a pregnancy loss don't need people to try to offer solutions or minimize their grief, but just to validate it.
"You aren't trying to fix their emotions, you are simply stating, 'I hear you, that was so hard for you, this really sucks right now.' No need to fix, no need to tell someone it will be okay. It's a time to just give a hug and tell them it's okay to feel how they feel. This often creates comfort just by knowing someone is there for you," she tells Motherly, adding that it is totally normal for parents to struggle after a loss.
"It's a completely normal experience to have a bunch of grief, sadness, depression, anxiety, shame, guilt and jealousy of others with healthy successful pregnancies," McCormack explains.
For Dewedoff-Carney, that's exactly what Project Benjamin is all about. She says too often conversations about the feelings one has after a miscarriage or infant death are happening behind closed doors or in private Facebook groups. She hopes her photo series will help people realize they're not alone, and that the woman down the street (or on Instagram) who seems to have it all may be suffering herself.
By having a very public conversation about pregnancy loss, Dewedoff-Carney and her fellow moms are hoping more people will understand what they're going through, and not try to minimize it.
Ashlyn Biedebach is a Registered Nurse and founder of By The Brook Birth Doula. She says "when a woman suffers a loss, at any gestational age, it is truly a loss, not just of a baby, but of hope and an idea of the future."
Biedebach suggests if parents who've suffered a loss encounter loved ones who don't seem to be recognizing their baby, they try to give them some grace, but that doesn't mean you have to pretend it didn't happen.
"Well-meaning family members may intentionally choose to move past painful experiences, even if you are still deep in the grief of the loss of your baby. Bringing up your loss in a gentle way, or having an intentional conversation with those who are moving on can help, but also talking with a counselor, too."
As a therapist, McCormack agrees. "Since it's roughly 1 in 4 women that have a pregnancy that ends in miscarriage, women need support," she tells Motherly, recommending that women who've had a loss talk to their OB-GYN or family physician and ask if there are any support groups in their community.
If your doctor doesn't refer you to a support group you can find a therapist yourself. McCormack suggests women simply search the psychologytoday.com therapist directory by entering their zip code along with the keywords "miscarriage" and "fertility." The therapy doesn't have to be just for mom, either. Sometimes dads need to talk, too.
"I also encourage couples to go to therapy after something like this, as men tend to feel lost and uncertain as to how to process their own feelings while supporting their partner," says McCormack.
Both McCormack and Biedebach agree that talking about this kind of loss, whether in person or over social media, is important. Biedebach says, for some parents, honoring their baby through a social media post is their way of remembering and recognizing their importance. McCormack notes that a social media post can also be a good way to invite a larger quantity of people to support you in your time of need.
"It also reduces the stigma by bringing to light that it is completely normal for women to experience something like this," she explains.
That's Dewedoff-Carney's goal, and while she can't travel the county photographing mothers herself, she's inviting anyone to join the conversation by taking their own photo, sharing their story and using the hashtags #StruggleDoesNotHaveALook and #TheyMatterToo. Since her photos went viral, women have been commenting and sharing their stories publicly, and it's brought Dewedoff-Carney to tears.
"They're naming the children that they lost," she explains. "They're doing that, they're speaking their truth, and they're letting it out."
You might also like:
Chrissy Teigen has been very open about the ways pregnancy has changed her body. Mom to 2-year-old Luna and 4-month-old Miles, Teigen—a former swimsuit model—has famously embraced her postpartum body (stretchies and all), while noting that she's still, at times, insecure about it, but she's not ashamed.
That's why, when a man on Twitter commented on a photo of Teigen's red carpet look for the Emmy's to ask the whole wide world (and Teigen herself, he tagged her) if she was pregnant again, Teigen was quick to shut down the shamer.
"I'm asking this with the utmost respectful [sic], but is @chrissyteigen pregnant again?" The man wrote.
"I just had a baby but thank you for being soooo respectful," Teigen replied (from the Emmys).
Fellow moms were quick to jump to Teigen's defense. Many pointed out that Teigen actually looks incredible for any human, let alone one who is four months postpartum. Other mamas were quick to chime in with stories about their own lingering baby bumps.
For a lot of women, our bodies are different after having a baby. Sometimes that means we're a little rounder in the middle than we used to be. It happens to almost everyone, even red carpet-walking A-listers, like Teigen and actress Jennifer Garner, who once told Ellen Degeneres that she would have a bump forever.
"I am not pregnant, but I have had three kids and there is a bump," Garner explained in 2014, after paparazzi photographs fueled speculation that she and Ben Affleck were expecting a fourth child. "Forever and ever, not another baby. Just a bump like a camel. But just in reverse," Garner jokes.
Like Garner, Teigen dealt with the pregnancy question with a sense of humor, but she shouldn't have had to defend her body from the Emmys. As many, many Twitter users pointed out to the man who asked, it's never cool to ask a woman if she is pregnant.
It's not polite to ask, and it's no one's business whether a woman's bump is a pregnancy, some fabric, a burrito, a weird shadow or (as in Teigen's case) basically a figment of someone's imagination.
A lot of mamas online last night chimed in to say that while Teigen's stomach doesn't look like it did in her Sports Illustrated days, it still looks pretty freaking amazing.
Yes, after two kids, Chrissy Teigen doesn't look like a swimsuit model. But she shouldn't have to. She's not a swimsuit model anymore. She is a cookbook author with her own Target line and she hosts a hilarious TV show. She's also a mother. She is so much more than her midsection.
"Honestly, I don't ever have to be in a swimsuit again," she recently told Women's Health. "Since I was 20 years old, I had this weight in my mind that I am, or that I'm supposed to be. I've been so used to that number for 10 years now. And then I started realizing it was a swimsuit-model weight. There's a very big difference between wanting to be that kind of fit and wanting to be happy-fit."
Teigen is happy with her body, and we're happy she spent Emmy night educating the internet about respecting women.
You might also like:
|
Photographing Wildlife in Low Light
Critters are most active in the early morning or late evening. It's as if they have no respect for photographers who want to photograph them. Seriously, the nerve of these animals.... Anyway, in order to photograph them when they are active you have to shoot in some pretty low light situations. Here you will find some suggestions on how to make the best of what nature provides you.
Aperture. The Aperture is the opening in the lens and you want as large as you can get as to let in as much light as possible (smaller f-number). You will want to be as wide open as is reasonably sharp for the lens you have. No all lenses are sharp at the widest aperture so you will need to do some homework to find out what's best for your lens.
Shutter Speed. The shutter speed typically needs to be 1 over the focal length of the lens to get a good clear shot devoid of camera shake. So if you have a 300mm lens you need a shutter speed of at least 1/300th of a second. With many lenses now having Vibration Reduction you can go a bit slower. In fact, if you are photographing animals in dim light you may have to be much slower. This may be fine if you are on a tripod and the critter isn't moving fast.
ISO. ISO represents your camera's sensitivity to light. The higher the ISO the better you can shoot in lower light. There is a trade off as there always is in photography. The trade off is noise. As you increase the ISO you also increase the noise but this may be your only option in certain situations. It's better to have some noise than to not get the shot at all. Most modern cameras have good ISO performance.
Lens Choice. Typically you need a large and fast lens for wildlife photography. You need to be able to get close to the animal without physically getting close, hence the large focal length lens. Unless you enjoy challenging a grizzly for its territory and if you do then perhaps you should be reading a psychological disorder page rather than this one.
You will also need a fast lens to let in as much light as possible. So, what does a large fast lens equal? A new mortgage on your house. Most of us can't really afford a 400 f2.8 or a 600 f4 so we go for a variable aperture zoom lens such as the Nikon 80-400 f4.5-5.6. These let in less light so we have to consider Shutter Speed and ISO to help make up the difference.
Burst Mode. Burst Mode not only sounds cool but it will allow you to get sharper images. What? Yeah, you heard me... Sharper images. When you lay down on the burst mode you are firing off tons of shots. There is a good chance one or more of those shots will be at the exact right time giving you a sharp image. Plus, this increases your chance to get the subject doing something interesting.
Tripod. Seriously... You need a tripod. Not a monopod and not hand held. We are talking about you being out before the crack of dawn shooting a moving subject with a large focal length lens. A good and stable tripod will help keep camera shake out of the equation. This will allow you to lower your shutter speed giving you some additional light. If the subject isn't dancing a jig you should be golden.
So, what advice do you have when photographing wildlife in low light? |
“Matching job creation with industry demand is the key to end unemployment”
– Narendra Modi
Large sections of the existing workforce have little or no job skills. This makes them unemployable and enables them to earn very little despite existing opportunities. For example, an unskilled construction worker will put in ten hours of work in a day and make minimum wage. The same amount of hours put in by a skilled labour, will generate 40% more income in comparison to unskilled labour.
Over 62% of the population is the working-age group. Yet, only 4.69% of the Indian population has undergone formal skills training
93% of India’s workers work in the unorganised sector and acquire skills through informal channels and lack formal certification
About 89% of the 15-59 year olds have had no vocational training
The Challenge
Nearly 300 million people in India live in extreme poverty. The reason for this is low earnings due to the lack of skills. Due to extensive migration of rural population to urban areas in search for work, there is an abundance of labour as well as job opportunities. However if these people migrating to urban areas do not have any skills, it becomes hard for them to find employment that enables them to earn a liveyhood. The current training capacity is a fraction of the 12.8 million new entrants into the workforce every year. Therefore access to skills programs becomes a major challenge.
Our Endeavour
Making communities self sustaining and resilient by teaching them the skills they need to fend for themselves
What we do
According to the 11th five year plan report of Planning Commission, 82 % of the construction sector workforce are unskilled and belong to informal sector of the economy. They continue to remain the ones who are most underpaid and have a poor job security. We offer training in safe practices in masonry and construction systems with a view to provide efficient and high quality service. Our courses are oriented towards masons, small scale and petty contractors and youth who would like to pursue their careers in masonry.
We offer multiple courses that the mason can take up varying with level of masonry skill he/she possess. There are short term courses focusing on providing training in basics areas like masonry, shuttering carpentry, steel work and plastering. These trainings also involve value added training to the existing masons like preparation of quotations, financial management, ‘Disaster and Risk Reduction’ techniques, construction safety, wastage reduction, labour management and also new development in construction technology. The advanced courses are mainly for experienced mason and it would focus on training incumbents on repair/Retrofit of buildings. The courses are provided at a very minimal cost.
Most of trainings are designed as a judicious combination of practical and class room awareness sessions for better learning and easy understanding. All incumbents are awarded certification on successful completion of the course.
Women even today continue to be one of the most vulnerable groups in the informal economy of the country. They often face serious constraints related to work viz. lack of continuity, job insecurity, wage discrimination, gender harassment etc. Special focus on women construction workers is aimed at empowering them by developing their skills which will lead to enhanced quality of life, raised economic strength, increased efficiency and bargaining power.
We aim to help women boost their skills, find employment and subsequently improve their quality of life. We conduct training courses in plumbing and masonry for women. The women who participate in the program challenge multiple social and traditional barriers as they acquired skills in fields which are mostly considered “manly” and practiced largely by men in their community.
Most of the trainees have limited formal education. However, this is not seen as a hindrance to learning. Rather, more creative ways are taken up to impart the training. The programmes run with a combination of audio visual lectures, presentations and practical sessions that enables women from all levels of education to grasp the concept. We not only provide classroom training, but also engaged the women in field visits and internships, giving them opportunities to learn on ground. |
The Cassini spacecraft will explore the planet Saturn and its rings and moons with an orbiter and atmospheric entry probe, both of which have a sophisticated set of science instruments. The spacecraft design is responsive to mission and science objectives, and is influenced by technical and programmatic constraints e.g., a cost cap, fixed schedule, space environment, and interfaces to other fixed systems like the launch vehicle and ground system. The spacecraft design must also consider the limited post-launch resources allocated to do the flight operations. This paper presents an overview of the spacecraft system design with emphasis given to the orbiter and only a high level summary of the probe.
Roger Gibbs, Roger Gibbs, } "Cassini spacecraft design", Proc. SPIE 2803, Cassini/Huygens: A Mission to the Saturnian Systems, (7 October 1996); doi: 10.1117/12.253425; https://doi.org/10.1117/12.253425
Back to Top |
Study Guide Geography of Europe
Topics: European Union, World War II, Europe Pages: 3 (825 words) Published: April 2, 2013
Geography 349 --- 2nd Exam Study Guide (part 3 of 3)
Nationalism: How was Europe divided politically in the decades following World War II? When did this division end? What are the major changes that have occurred since the end of the 1980s that make Europe’s current political geography so dynamic? How does one define nationalism? When and how did nationalism emerge as a force? What was the role of Romanticism in the rise of European nationalism (examples of romantic nationalistic symbols on the landscape)? How might we differentiate between how nationalism established itself in Western Europe as opposed to Eastern Europe? What happened to Europe’s large multi-ethnic empires after World War I? What extreme form of nationalism arose in Europe between the two world wars? How have national feelings affected commemorative monuments to World War II (examples)? What has happened to nationalism since World War II in the West vs. the East? To what extent have extreme-right, xenophobic political parties come to play a significant role in the politics of western European countries? How can the bitter conflicts that accompanied the breakup of Yugoslavia during the 1990s be viewed as an extreme and violent example of ethno-nationalism in the post-Cold War era? How can the possibility of independence for Scotland be compared with what has happened in the Balkans (media article)? The possibility of a new Eurasian Union, consisting of Russia and several other east European countries, has been raised … in what ways would this vision differ from that of the old Soviet Union (media article)? What are the so-called micro-states of Europe, and how are they unique? Supranationalism: What do we mean when we speak of the “hollowing out” of the nation state? What were the origins and early goals of the EEC? What do we mean by the terms “widenings” and “deepenings” What countries made up the original EEC 6, the EC 9, EC 10, EC 12, and EU 15? What 10...
Continue Reading
Please join StudyMode to read the full document
You May Also Find These Documents Helpful
• Study guide Essay
• Study Guide: Geography Essay
• Essay on My Geography Study Guide
• Geography Study Guide Essay
• Essay on Geography
• Ap Human Geography Study Guide Essay
• Geography Essay
• AP Human Geography Study Guide Essay
Become a StudyMode Member
Sign Up - It's Free |
Were these early entries into the workforce valuable learning experiences? Or did they help convince the young entrepreneurs to pursue a different career or to aim to be their own boss? We take a look at the first jobs of some leading CEOs.
Warren Buffett, CEO of Berkshire Hathaway
Selling chewing gum
Aged just six years old, Buffett sold packs of chewing gum around his neighbourhood. Even at this stage, he showed a preternatural business sense. When a woman tried to buy a single stick of gum instead of the packs of five he was offering, he refused, knowing it would cut into his profit margins.
Richard Branson, founder of Virgin
Breeding budgerigars
Inspired by his enterprising mother, Branson and a school chum teamed up to breed birds for profit when he was just 11. The business actually grew quicker than the pair could keep up with and his mother eventually tired of the multiplying birds, releasing them out a window when he was at boarding school. It was an early lesson in the importance of managing growth. Branson has also suggested it may have begun his lifelong passion for animals.
Oprah Winfrey
Grocery store clerk
The young Winfrey’s first job was convenient, being located right next to her father’s barber shop. It wasn’t a good fit, however. “I wasn’t allowed to talk to the customers, and can you imagine that for me?,” she recalled. “That was very, very, very hard.” Soon she moved into reading the news at a local radio station, a role more suited to her gregarious nature.
Elon Musk, founder and CEO of Tesla, Inc
Boiler room janitor
Musk’s first gig after arriving in the US was a long way from the excitement of launching rockets into space or planning the colonisation of Mars. The local unemployment office found him a back-breaking job which involved shovelling hot sand in a confined space. “You (had) to put on this hazmat suit and then shimmy through this little tunnel that you can barely fit in,” he recalled. Simply surviving in the role required steel: 30 people started out with Musk, but by the end of the first week he was one of only three that hadn’t quit.
Janine Allis, founder of Boost Juice and Retail Zoo
Advertising agency junior
Offered a safe job at the Commonwealth Bank, Allis turned it down and instead followed her sister into what she saw as the more glamorous world of advertising. As her autobiography The Secrets of My Success would have it, the industry in the 80s was “all about short skirts, bad hair and boozy long lunches,” though Allis soon tired of the unchallenging work in her junior role.
Reed Hastings, Co-founder and CEO of Netflix
Selling vacuum cleaners
After being accepted into college, Hastings deferred for a year to continue what had started out as a summer job as a door-to-door salesman. “I loved it, strange as that might sound,” Hastings recalled. “You get to meet a lot of different people.”
Terry Lundgren, Executive Chairman of Macy’s, Inc
Shucking oysters
Needing funds to pay for his college tuition, the future CEO of Macy’s, Inc took up this painstaking kitchen job. By the time he graduated from a business degree, he had been offered a role as assistant manager of the restaurant.
Ann Sherry, Executive Chairman of Carnival Australia
Sorting mail
Before she was an award-winning executive turning around the fortunes of Westpac New Zealand and later Carnival Australia, Sherry worked in a mail sorting room. She also studied radiography, economics and politics and worked as a social worker in a prison before making a hugely successful move into the world of business.
How do five of the best minds in business relax and unwind? |
Рефераты по экономической теории
На нашем ресурсе вы можете скачать «Курсовая по экономической теории на английском» в CHM, PRC FB2, AZW3, HTML, PDF, EPUB, МОВІ, TCR, RTF, LIT, DJVU, JAR, DOC, isilo, LRF, TXT! The main marketparticipants are sellers and buyers. A buyer gives upmoney and received a good, while a seller gives up a good and receive money.
Both sides tendto benefit by an exchange.
Экономический английский |
Barter is theexchange of goods and services performed directly, without using money. Money is a mediumof exchange, in terms of which the value of all goods and services isexpressed. Money allows for complex exchanges to take place more easily than usingbarter. The price is theresult of compromise between expectaions of a buyer and a seller. The differencebetween the price at which you sell a good and the price at which you bought itin a trade transaction is normally referred to as profit.
A completely freemarket is an idealized form of a market economy where buyers and sellers areallowed to transact freely without any state intervention in the form of taxes,subsidies or regulation. A completely freemarket economy is an idealized abstraction. A socialisteconomy is supervised by government, a capitalist economy has a strong privatesector. There is no universally accepted definition of the termmarket in economics. Экономическая теория и микроэкономика; Часть 2. Макроэкономика и мировая экономика.
Данное пособие Часть 1. What is economics about? |
Google Search
Tuesday, April 12, 2011
First Plastic Surgery n Cataract surgery - in India
Plastic Surgery – was first performed in India around 2000 BC and then popularized in the Arab world that actually launched it to Europe. The person behind this groundbreaking medical practice in India was Sushruta. He is credited for performing the first rhinoplasty (nose-job) with a unique understanding of the circulation system.
Stones - The earliest operation for removal of a stone is also given in the Sushruta Samhita (6th century BCE). The operation involved exposure and going up through the floor of the bladder.
Because of his seminal and numerous contributions to the science and art of surgery he is also known by the title "Father of Surgery." Much of what is known about this inventive surgeon is contained in a series of volumes he authored, which are collectively known as the Sushruta Samhita in which he describes over 300 surgical procedures and 120 surgical instruments and classifies human surgery in 8 categories. He lived, taught and practiced his art on the banks of the Ganges in the area that corresponds to the present day city of Varanasi in North India.
Sushruta Statue in Patanjali Yogpeeth, Haridwar
1 comment:
1. Hi |
As sweet as honey, the threatened honey bees
Gaynor Lawson in 2008 – “Over the last few years, the numbers of bees have been decreasing mainly because of man-made problems. Change in climate and agricultural practices such as misuse of pesticides is one of the reasons. Saving the bees is saving our future because without bees, food will be scarce.”
(Press release from Cape Govt. dated 29th May 2018 – Department of Agriculture to release its strategy to sustain the honey-bee population in the Western Cape. No other single animal species plays a more significant role in producing fruit and vegetables than the bee. But there has been global concern about the health of bee populations and the sustainability of the numbers of honey-bee colonies needed to support commercial pollination needs. It is estimated that the demand for pollination will double over the next decade, and the question is will there be enough bee colonies to go around? Major threats facing honey bee populations include disease, pollution and insufficient forage in urban environments. In response, the Western Cape Department of Agriculture, working with the Western Cape Bee Industry Association, has devised a strategy to address the challenges in the industry, and prevent any further drastic impact on the honey bee population of the Western Cape.)
By Gaynor Lawson, guest author. Gaynor lives in the beautiful KZN Midlands and was the publisher, editor and writer of the very popular local newspaper The Quill where this article first appeared. We were fellow members of a small but energetic Writer’s group. We met monthly to share our stories and to quaff significant quantities of fine South African wine.
Honey has delighted humans for over 40 centuries.
Ancient Egyptians paid their taxes with it, the Bible refers to it as “the heavenly food”, and ancient Greeks made honey-cakes as offerings to their gods and minted coins with bees on them. But few of us realise just how amazing the bee and its honey really are.
Bees have been producing honey for at least 150 million years, and this industrious creature has remained unchanged for 20 million years. The earliest illustration of honey being gathered is found on the walls of a rock shelter in Spain, and is estimated to date back to about 15 000 years ago. Yet despite a very long relationship with mankind, bees have never become domesticated.
Before mankind learned how to ‘keep’ bees in man-made hives, ancient man collected wild honey by driving away the bees and destroying the nest. However, early Egyptians created long cylindrical hives from twigs and hardened mud, in which they bred bees and harvested their honey. Over the centuries, man explored making hives from many different materials and in numerous shapes, using logs, baskets and pots, or hanging containers in trees, and beekeepers came to understand that it was not sensible to destroy the bee colony when harvesting honey.
The earliest recorded use of hives with movable frames was in 1682, in Greece. By the mid-seventeenth century, beekeepers were stacking together “skeps”, the old-style rounded beehive structures, so that a box of combs could be removed without killing the colony. By the first half of the 19th century, removable frames containing honeycomb were used but beekeepers had problems with bees building comb between the frames. In 1851, Reverend Lorenzo Lorraine Langstroth of Pennsylvania in the USA developed the concept of “bee space”, the space needed to separate parts of the hive to make them too wide for the bees to fill with honey. The modern Langstroth hive is still used today, with combs filling up frames like rectangular window screens.
A complex community
There are three types of bee, the worker, the drone and the queen, and each has a vital role to play, and all are totally interdependent. The worker bee is always female, and takes on all tasks essential to the colony, including collecting nectar and producing honey. The drone’s sole function is to mate with the queen, whose only activity is to produce eggs for the hive, and to maintain the social order of the community by emitting glandular secretions.
The worker bee: starts out as a “house” worker, caring for the interior of the hive by cleaning cells, feeding honey and pollen to larvae, comb building, and removing nectar from “field” bees and placing it in cells. Worker bees also ventilate the hive by fanning their wings. At 18-21 days, the worker bee is entrusted with guarding the hive, as her sting glands now contain the maximum amount of venom. After 21 days, the worker bee becomes a “field” worker bee, and never returns to household duties. She now collects nectar, pollen, or water, depending on the community’s needs. Using ultraviolet vision, worker bees can see deep inside flowers to find ones full of nectar, which will be sucked out and stored in the honey-sack on her body, while pollen is collected and stored in separate pollen sacks on her back legs.
The drone: is always male and his entire body is adapted to mating with the queen, with no sting or any body features like the worker bee’s pollen sacks. Drones are reared in spring when the hive’s resources can sustain them, and, becoming sexually mature at 10-12 days, they mate with the queen, dying in the process. In autumn, drones are not allowed to feed, and when weakened, their bodies are dragged from the hive by worker bees.
The queen
The queen comes from the same egg as the worker bee, but is fed far more lavishly, resulting in numerous anatomical differences, equipping the queen to mate and store sperm for long periods. Queens live for about five years, and when her health is failing or she is dying, the hive immediately begins to enlarge an egg or day-old larvae, and constructs a special cell to house the new queen. Only when she begins to emit certain secretions, a few days after emerging, is the bee identified as the new queen. Her first days are spent feeding on pollen and nectar, and seeking out and killing other virgin queens and queen cells. At 5-6 days old she begins to mate with an average of 8 drones, and starts laying eggs 2-3 days later. This mating provides about 5-million sperm that will last the queen the rest of her life. The queen is busiest during summer, when the hive needs to be at maximum strength, and she lays about 1000-1500 eggs each day.
How honey is made
Honey is the bee’s primary food source, and bees are kept busy collecting nectar to make sufficient food stores for the colony. Field worker bees visit between 50-100 flowers during one collection flight, and on the flight back, sugars in the nectar are simplified so that they can be changed into honey. When she reaches the hive, the worker bee transfers the nectar to house worker bees in a delicate “tongue-to-tongue” ritual. The house bee then spreads a drop of nectar inside a honey-cell to begin the drying process that converts nectar into honey, and packs pollen into pollen cells.
Worker bees do not automatically know how to make honey, but are taught by more experienced bees. House bees fan their wings to evaporate moisture from the nectar, which is 80% water, and close the cells with a wax cap. Inside, the thickened nectar ages into honey.
Honey has different flavours and colours, depending on the location of the hive, climatic conditions, and the kinds of flowers the bees visit. To produce 2kg of honey, 2 million flowers must be visited, and the hive will fly 55 000 miles. Honey-making is a huge task for the hive: an average worker bee will only make about a twelfth of a teaspoon of honey during its entire lifetime. The hive needs honey to survive the winter, as worker bees only leave the hive for short cleansing flights in colder months, and the bees live on the honey collected during summer. They form a tight cluster inside the hive to keep themselves and the queen warm.
How bees communicate
Bee colonies have unique odours that members emit like identification cards at the hive entrance. Honeybees have an acute sense of smell using their antennae, and communicate by using chemical substances called “pheromones”, secreted from a gland, to evoke a response from other bees. Pheromones communicate alarm or mating signals, and mark food sources or enemies. When bees sting to protect their hive, the stinger is left in the enemy to mark them as hostile no matter where they go.
The ‘dance of the bees’ is a special dance by worker bees to tell others about food sources, using physical movements, and pauses to give their audience a taste of nectar or pollen. There are two basic dances. The round dance indicates that there is food close to the hive and others should seek it out. The ‘tail-wag’ dance gives information about the direction and distance of the food, and usually, the faster the dance, the closer the food source.
Some fascinating facts
• Bees fly at about 12 miles an hour.
• Bees have four wings and five eyes.
• Bees’ wings beat at 11 400 times per minute, which creates their distinctive “buzzing”.
• Honey is the only food that includes all the substances necessary to sustain life, including water. It contains vitamins and anti-oxidants, and is fat-, cholesterol-, and sodium-free.
• Honey never goes off, and honey found in the tomb of King Tutankhamun was edible.
• Honey was the most used medicine in ancient Egypt: of more than 900 medical remedies that we know about today, more than 500 were honey-based. Physicians in ancient Rome used honey to help soothe their patients to sleep. As recently as during World War One, honey was mixed with cod liver oil to dress wounds on the battlefield.
• Honey attracts and absorbs moisture, making it very soothing for minor burns and helps prevent scarring. Honey is acknowledged as an anti-microbial agent, deterring certain bacteria, yeast and moulds.
• Bees also produce a natural food and medicine called “propolis” from plant resins, to keep their hive free of bacteria, fungi and viruses. It contains at least 150 chemical compounds that work synergistically to combat disease and boost immunity in humans.
• The true honeybee was not known in the Americas until Spanish, Dutch and English settlers introduced it at the end of the 17th century. Today, honeybees perform 80% of the pollination of the fruit, vegetables and seed crops in the USA.
A local problem
Beekeepers in southern Africa are battling the plundering of their hives by humans. These honey-thieves smash up the hives and kill the bees in their attempt to get at the honey and honeycomb, which is frequently sold on the side of the road. Wild hives are also destroyed, and because smoke is used to subdue the bees, veld and forest fires are often started at the same time.
Please don’t support roadside honey-traders: buy your sweet treat from a reputable shop, and stop people killing off our bees.
The bad news
Bees worldwide are under threat. Bee colonies are collapsing on a frightening scale. The main culprit that has emerged is a new type of insecticide which is a neurological toxin that affects information processing in the bee’s brain. After a while they can’t navigate home. Foraging bees die before they can get back to feed the babies or they pass it onto the babies and queen. In SA we are now using these toxic insecticides even though they have been banned in Germany, France and England.
Bees pollinate two-thirds of all our food. Their contribution to the SA citrus industry alone accounts for 1.6 million rand in value. When scientists noticed that silently, they were dying at a terrifying rate, swung in to action, and kept on swinging until they won. The victory was the result of two years of flooding ministers with messages, organizing media-grabbing protests with beekeepers, funding opinion polls and much, much more.
For the full article –
Guest Author
Leave a Reply
Scroll Up
%d bloggers like this: |
(Exercising Your Mind) The following information is not standard for everyone and may even be out-dated or obsolete for some. However, it may work in a general way for most people. Many factors will effect how a certain amount of calories effects you as compared to others. These factors are things like how much sleep you get, if you breathe deeply and fully, if you drink adequate amounts of water, your levels of stress, environmental toxins and perhaps your genetics.
Thermodynamics includes four laws dealing with the interactions between heat and other forms of energy. Energy can neither be created nor destroyed; it may only change from one state of being to another. These conversions are either useful or not, relative to the context in which the transmutation is occurring. Thermodynamics is basically accounting and keeping track of how energy moves through a system, such as your body, as inflow and outflow, and what work it may or may not accomplish with this given energy. Work is the transfer of energy from one object to another, usually as movement.
The form of energy you put in is chemical energy in the form of food, which may be measured in Calories. Basically, the more movement or exercise you commit your body to engage in, the more of this food energy will leave your body system converted into heat and not remain in a storable composition in your body as triglycerides.
Gram Calorie: Another word for “calorie”; a unit of food energy. In nutrition terms, the word calorie is used instead of the more precise scientific term kilocalorie which represents the amount of energy required to raise the temperature of a liter of water one degree centigrade at sea level. The common usage of the word calorie of food energy is understood to refer to kilocalorie and actually represents, therefore, 1000 true calories of energy. A gram calorie is also known as a calorie, cal, or small calorie.” -Ron Kennedy, M.D.
This law of thermodynamics (heat-energy conversions) is a great and wonderfully simple guideline to manage and control your body weight. Simply stated; if more calories or energy goes into your body than is expended, you will add body weight. If more is burned than is taken in, you will remove body weight. Another piece of data to consider is that one-pound of fat contains approximately 3,500 Calories. This means that in order to lose one-pound of fat in one week, you must use up an excess of 500 Calories per day for 7-days consecutively, or a total of 3,500 in one week.
Caloric availability:
• Protein = 4 Calories per gram
• Carbohydrate = 4 Calories per gram
• Fat = 9 Calories per gram
• Alcohol = 7 Calories per gram
• Water = 0 Calories per gram
Knowing this allows us to track how many Calories we intake when preparing our own food or reading the labels of packaged items. We should be careful to observe that a box of cereal that contains 250 Calories in the ‘amount per serving’ area, this does not mean the entire box is 250 Cal.. Usually you will notice that 7 – 10 or more servings are in one box meaning that 1,750 – 2,500 calories are in that single box. If you had 40 grams of 75% lean meat, then we could calculate that 30 grams are protein, while 10 grams are fat. 30 x 4=120 + 10 x 9 =90= 210 Calories.
It has been said that one hour of training in boxing or kickboxing style aerobics classes can burn from 700 to 1200 Calories in one hour. Put in perspective, this significantly reduces the amount of time in days and hours required to accumulate enough burned Calories to shed that pound; however, this is too high impact or otherwise intolerable and undesirable for most people.
There are many other less intense exercise programs that may burn as much or more than combat style workouts, and others that are just as mild featuring fewer calories burned per hour. Walking is one of the simplest and most effective methods for moderate exercise.
Whatever fitness routines you subscribe to, the method for weight management calculations is simple. Count your food Calories on a note-pad, and count your exercise expenditure in the same pad. Subtract the total Calories burned during exercise from the food total Calories available and you’ll have the difference. If it is negative (less than zero) consistently then you are on your way to removing pounds. If equal consistently, you will maintain the same weight. And of couse if positive consistently, you will add weight. There are more meticulous calculations that may be done for much more precise and accurate weight management. However, this overview is sufficient enough to begin safely and effectively monitoring your healthy weight.
It is always suggested that you consult a licensed M.D. specializing in exercise and / or nutrition, and R.D.s (Registered Dietitian). Caring, experienced, and well practiced C.Pts, (Certified Personal Trainer) or Group Fitness Instructors with the same dedication to safely assisting others to enjoy the most healthy lives attainable, are also suggested resources. Any sufficiently motivated person may educate themselves and do this on their own. In any case, when you want something, one way I have found is simply to immerse yourself in the subject. For example, if you would like to be ‘more fit’, then surround yourself with more fit people, books about fitness, movies, t.v. shows, songs, poems, magazines and talking about fitness. However you can most easily and comfortably consume this information is recommended.
Remember, at all times to effectively achieve any goal, the focus must remain on being fit and healthy. I would now recommend unplugging from the computer for a while and going for a walk to think about burning more Calories and being more fit.
Copyright 2005 by Hakeem Alexander.
Understanding Thermodynamics, H.C. Van Ness-1969
Optimum Pefrormance Training for the Fitness Professional, National Academy of Sports Medicine-2003
Leave a Reply |
"The Hermit's Dog" by William Hayley
Number eleven of a set of twelve ballads describing animals is "The Hermit's Dog" by the British writer William Hayley (1745-1820). The simple poems are stylized in the Romantic period of the day, as is "The Hermit's Dog," which tells of the narrator-poet wandering the Alpine hills who happens upon a hermit. The hermit tells the story. One day while wandering about, the hermit heard a dog and came upon the sad scene of the dog's master dead on the ground, perhaps one or two days, menaced by vultures. The dog had faithfully stayed with his fallen master, killed one of the vultures, though not without being itself wounded, and the other vulture flew off at the hermit's approach. Both dog and master wore the cross of Malta. The dog would not leave his master, so the hermit brought the body near his own dwelling and buried it, and so the dog became his companion, whom the hermit names Hero. The hermit tells the poet that had people been half as loyal as this dog, he would not have sought out this wilderness as his solitary home.
What is noteworthy of the Hayley's Ballads is that they were illustrated by William Blake (1757-1827), including a print to "The Hermit's Dog."
"The Hermit's Dog" by William Hayley
Of dogs who sav'd a living friend,
Most nobly, ye have read:
Now to a nobler still attend,
A guardian of the dead.
As o'er wild Alpine scenes I stray'd,
Not far from that retreat,
Where Bruno, with celestial aid,
First plann'd his sacred seat.
An anchorite of noble mien,
Attracted my regard;
Majestic as that savage scene,
Or as a Cambrian bard.
He to no silent dome belongs,
The rock is his domain;
It echoes to his nightly songs
Devotion's lonely strain.
His mansion is a tranquil grot,
Form'd in the living stone:
My view of the sequester'd spot,
I owe to chance alone.
For happening near his cell to rove,
Enamour'd of the wild;
I heard within a piny grove
What seem'd a plaintive child.
The distant cry so struck my ear,
I hasten'd to the ground,
But saw surpris'd, as I drew near,
The author of the sound.
No human form, yet one I thought,
With human feelings fill'd,
And from his tongue, by nature taught,
Strange notes of sorrow thrill'd.
Unseen myself, I clearly saw
A dog that couchant moan'd;
He struck the hard earth with his paw,
Then look'd at Heaven, and groan'd!
With silent caution I drew near,
To mark this friend of man,
Expressing grief in sobs so clear,
It through my bosom ran!
The noble beast was black as jet,
And as a lion large;
He look'd as on a tombstone set,
To hold the dead in charge.
Grand was his visage, round his neck
Broad silver rings he wore;
These rings, that his dark body deck,
The cross of Malta bore.
I gaz'd, but soon my steps, tho' soft,
Announced a stranger near;
The brave beast bounded up aloft,
Nor was I free from fear.
But soon his master's voice represt
And call'd him to his side:
And soon I was the hermit's guest,
He was my guard and guide.
My own intrusion to excuse,
The wond'rous dog I prais'd,
Whose milder mien my eye reviews,
Delighted and amaz'd!
"If I disturb thy calm retreat,
Divinely calm indeed,
The noble servant at thy feet,
May for my pardon plead."
"That noble servant in my sight
Whom strength and grace adorn,
Announces, if I read aright,
A master nobly born."
The sire replied, with graceful bend,
"No not my servant, he!
A noble independent friend,
He deigns to live with me!"
"But, stranger, if you kindly rest,
His story you shall hear,
And all that makes my sable guest,
Most singularly dear."
"Here it has been my chosen lot,
Some awful years to spend!
Few months have pass'd, since near this spot
I gain'd this signal friend."
"This friend, with whom to live and die,
Is now my dearest aim;
He likes the world no more than I,
And Hero is his name."
"Some two miles off, as near a wood,
Of deepest gloom I stray'd;
Struck by strange sounds, I wond'ring stood,
They echoed from the shade."
"First like a noise in troubled dreams,
But soon distinct I heard,
A dog's triumphant bark, and screams,
That spoke a dying bird."
"A bird of loud portentous note,
One of the vulture race,
Which shepherds will to death devote,
In sanguinary chace."
"I thought some shepherd's joy to share,
And hurried to the sound:
To what I had expected there
Far different scene I found."
"A man, of blood-bespotted vest,
I saw upon the earth;
And Malta's cross upon his breast,
Spoke him of noble birth."
"Misfortune long had press'd him sore;
I know not how he died;
He had been dead two days or more,
When I his corse descried."
"Him, as their prey, two vultures seek,
With ravenous rage abhorr'd;
But Hero guarded from their beak,
The visage of his lord!"
"When first my eyes on Hero glanc'd,
One vulture he had slain:
The second scar'd as I advanced,
Flew off in fearful pain."
"Enchanted with a guard so brave,
So faithful to the dead:
The wounded dog to soothe and save,
With beating heart I sped."
"He lick'd my hand, by me carest,
But him with grief I saw
Half famish'd, and his gallant breast
Gor'd by the vulture's claw!"
"Tho' anxious o'er his wounds I bend;
By kindness or by force,
I could not tempt this generous friend.
To quit the pallid corse!"
"The body to my cell I bear;
This mourner with it moved;
Then he submitted to my care,
And all my aid approv'd."
"In the soft stone, that's near my cell,
I soon entomb'd the dead;
With stone above I shield him well,
And laurels round I spread."
"Oft to the spot with mournful praise,
The mindful Hero springs,
And in such notes, as he can raise,
A requiem he sings."
"Dear faithful dog! if man to me
Had half thy virtue shewn,
From social life I should not flee,
To roam the wild alone!"
"No! not alone, nor yet in woe,
While here thy virtues shine,
For I defy the world to shew
Associate like to mine!"
The dog, he now press'd to his heart,
Then utter'd this desire;
"Stranger if thine a poet's art,
Let Hero wake thy lyre!"
His wish was kind--may love so true.
Ne'er want its wishes long:
Thus from his fond suggestion grew,
This tributary song. |
Define research methods
Define research methods, Observational research what is observational research observational research (or field research) is a type of correlational (ie, non-experimental) research in.
Concepts:concepts are an abstraction of reality, sources of concepts research methods formal sciences statistics business. 1 introduction to quantitative research 11 what is quantitative research research methods in education (and the other social sciences) are often. The principles of validity and reliability are fundamental cornerstones of the scientific method. A business research method refers to a set of research techniques that companies employ to determine whether a specific business endeavor is worth their time and effort. Guidelines for defining public health research and the key word in the regulations= definition of research for guidelines for defining public health. Research does require some interpretation and extrapolation of results in scientific research, there is always some kind of connection between data (information.
Related to research methods: research methodology, research design research the systematic, rigorous investigation of a situation or problem in order to generate new knowledge or validate existing knowledge. Limitation in research is the lack of adequate information on a given subject due to variables limitation in research most often applies to academic research. Learn more about some of the important terms and concepts you should know when it comes to psychology research methods. Types of research methods adapted from edvantia sbr rating for technical assistance programs and services form (2007) and carter mcnamara overview of methods.
Is there any difference between research methods and research methodology researchmethodsare the various procedures, schemes and algorithms used in research. Our research methods pages are designed to help you choose and then use the right research method for your purposes they cover the whole process of research, from.
Research method meaning, definition, what is research method: a particular way of studying something in order to discover new information about it or learn more. Chapter 6: research methods define research in general and health systems research in particular 2 enumerate the characteristics of research 3. Research comprises creative work undertaken on a systematic basis in order to increase the stock of knowledge, including knowledge of humans, culture and society, and the use of this stock of knowledge to devise new applications.
Business research involves establishing objectives and gathering relevant information to obtain the answer to a business issue you can conduct business research to. Research understanding dementia research the four main approaches types of research the four main approaches research methods. One of the fundamental purposes of research design in explanatory research is to avoid invalid inferences what is research design design design methods.
Define research methods
Rated 4/5 based on 23 review |
Practice without theory is blind, theory without practice is useless. Edison.
Inicio Design
LED biasing.
It is certainly one of the most simple circuit to implement, but there are several questions that arise for newbies.
Normal LEDs work with 1.5V and a current of 10mA. Therefore we must calculate a resistance wich will be conected in series with the LED so that it takes the voltage exceeding the 1.5V that LED needs.
For instance, to drive a LED with a 5V power supply, the voltage drop across the resistor will be:
VRs = 5 – 1,5 = 3,5V
and to obtain the resistance value we must divide this voltage drop by the current of 10mA that LED uses:
Rs = 3,5/10e-3 = 350 Ohm.
In the case of IR diodes and high brite white LEDs, is wise to choose one with a known part number, to see its features in a NTE manual or on their datasheets because their biasing current values differ greatly from common LEDs.
Typical values for infrared LEDs are:
Vf Foward Voltaje 1,3V/100mA
If Continuos foward current 100mA
Typical values for high brite white LEDs are:
Vf Foward Voltaje 3,2V
If Continuos foward current 20mA
Is common in remote control transmitters the use of two IR diodes, this is done to increase the brightness of the transmitter and the angle of the IR beam. To polarize two diodes they can be connected in series. In this case we consider a resulting voltage:
1,3x2 = 2,6V
and the same current for a single 100mA diode, since they are connected in series.
See the link to the white paper 5mm IR Diode IR333.
See data sheets
Rythmic lights isolation.
A popular project among electronics enthusiasts, is the rhytmic lights. It is a very engaging and entertaining device, but we have to think about a very important consideration to design and build: the isolation of audio equipment. So we avoid a lethal risk.
Unlike a sequential light, the rhytmic lights box is connected to an external sound source and turn on lights with a small control voltage, the most suitable device for this purpose is the TRIAC. This component has no isolated control circuit from the "force" circuit. It has three pins: one of which, the Gate is to fire the TRIAC, another pin, the MT2, is one of the terminals of "force" and the third terminal, the MT1 is common for small trigger voltage and high voltage of "force" circuit. This terminal is normally connected to circuit ground terminal and to one of the electric home network. So depending on how you connect the mains plug, the earth can be connected to the phase (live) or neutral. In the first case the circuit ground is energized and through it the external audio source and any other device that is connected. Therefore there is a risk of electric shock when touching the ground line of our rhymic lights, the device housing, knobs and housing amplifier, equalizer, etc.
To eliminate this risk, we need to isolate electrically the rythmic lights from the audio source. There are several ways to do it:
1. Use an audio transformer.
2. Use a microphone to capture the audio from the environment for the rythmic lights.
3. Using optical isolation with optocoupler or optotriac.
1. Audio Transformer: connect one of its windings to the rythmic lights and the other to the audio source, so it provides galvanic isolation.
It is hard to find it and not worth manufacture, as other solutions are inexpensive and simple. If transformer is connected as amplifier the audio signal is distorted, as a voltage reducer could be so small that it would not be enough to trigger the triacs. You can also burn the transformer if the power of the audio is very high. These problems can be solved by connecting a power resistor in the winding which is connected to the sound source and using operational amplifiers to amplify the signal in the winding that connects to the rythmic lights.
2. Microphone: you can use a small electret microphone, they are very economical, but as the sign of a microphone is very small it must be amplified subsequently with operational amplifiers.
It has some practical drawbacks: it must obviously be in the ballroom, where the audio volume level is more than enough to work and can also be activated with the cries of the public. In addition, for some DJs is more convenient to install the equipment in a separate room from the ballroom where the audio level is not enough for the rythmic lights to work.
3. Optical isolation: it is the choice that seems to me more efficient. The optical components are inexpensive and easy to get. We can use an optocoupler like 4N36 or even better an optotriac like MOC family.
With the optocoupler we are not isolatoing the audio from the rythmic lights board rather we are isolating the control stage from the power stage (force), typically implemented with TRIAC's. The optocoupler LED is part of the control stage and illuminates the phototransistor which is part of the power stage. To maintain isolation, of course, we must use separate voltage transformers and power supplies. However it is easier to get voltage transformers than audio transformers.
Electronic components stores in Santiago.(Chile)
Whenever we develop a medium or large project, most likely you need to resort to more than one store, because no any cover the entire spectrum of components that exist.
The stores are named next are wich I have visited personally and regularly for years.
Victronics, they has the largest stock of components . All semiconductors normally used by students in laboratory experiences and most used in the industrial area. You can also shop online. They have parking.
Olimexhas few components, but has more modules and development boards, especially the popular Arduino. The Internet sales system works perfectly automatically reporting by email the state of the process.
Casa Royal has few components for design, also few to repair. They do have many devices and instruments at a good price.
RS is a global company that works with a supplier in England. There is everything. Components are requested by catalog and brought in 6-9 business days.
Casa Keim no great assortment of components for design, but they are the only ones with great range in power resistors and large printed circuit boards.
In the case of needing repair parts and schematic circuits for consumer equipment I prefer buying them from "Powerpuff Girls" at Digitel (phone 26324511), due to I'm not devoted to repair in this area, take the opportunity to ask them to guide me. They know all the typical failures of each model.
CM2 also specializes in components for repair. It's in "Galería Sur" of San Diego street (Santiago de Chile), but unlike the other premises of the gallery, is a big store, modern with a very complete stock.
In this gallery there are also several places to repair speakers.
Kowka specializes in electronic components to build electric guitar effects .
Digicom stock has not really updated, so they still keep old components that are already scarce.
Metacomhas all kinds of cables, sell by detail, audio, video, networking, etc. They have parking.
Fullalarms has control panels and sensors for home alarms at a good price. They have parking.
There is a store of industrial surpluses in Ñuble: Loetter. there are many transformers, motors, fans, radiators, contactors, variacs, instruments, etc. A good alternative for high-power components. There are also consumer line equipments in disarmament in the patio of the South Gallery.
And for those ingenuous who still believe that there is an electronic junk yard at "Carrascal" street, I regret to inform them that years ago a supermarket was installed.
If you need spares for electrical appliance, the best choice is to serch thru "Tenderinni" street with the original spare sample. |
September 22, 2018
Essex Library Presents ‘The Interactions Between Stars and Their Planets’ Tomorrow with Dr. Wilson Cauley
Wesleyan Post-Doctoral Astronomy Researcher Dr. Wilson Cauley
ESSEX — “Are we alone?”
Recent headlines from NASA confirm scientists’ discovery of the existence of three planets firmly located in the habitable zone, the area around the parent star where a rocky planet is most likely to have liquid water. We now know of thousands of planets around stars other than our Sun.
These extra-solar planets, or exoplanets, are highly diverse and exist in almost every conceivable form. In order to fully understand these exciting objects, we also have to learn about the stars they orbit and how the stars can impact the evolution of their exoplanet satellites.
On Saturday, March 25, at 1:30 p.m. at the Essex Library, Wesleyan postdoctoral researcher in astronomy, Wilson Cauley will talk about this relationship for a variety of different types of exoplanetary systems, including what these interactions imply for exoplanet atmospheres and the potential for life to thrive on these alien worlds.
|
Alcohol Use and Your Health
Drinking excessively can damage your health. alcohol addiction caused roughly 88,000 deaths for around 2.5 million years of future life lost every year in the United States from 2006-- 2010, shortening the lives of those who died by about three decade. Further, extreme drinking was accountable for 1 in 10 deaths amongst working-age women and men aged 20-64 years. The financial costs of excessive alcohol use in 2006 were estimated at $223.5 billion, or $1.90 a drink.
What is alcohol dependence ?
12-ounces of beer (5 % alcohol material).
5-ounces of wine (12 % alcohol content).
What is excessive drinking?
For females, 4 or more drinks during a single occasion.
For guys, 5 or more drinks throughout a single celebration.
Heavy drinking is specified as consuming.
For alcohol addiction , 8 or more drinks weekly.
For males, 15 or more beverages each week.
The majority of people who drink exceedingly are not alcoholics or alcohol dependent.5.
What is moderate drinking?
The Dietary Guidelines for Americans defines moderate drinking ">drinking as no more than 1 beverage per day for ladies and no greater than 2 drinks daily for men.4 However, there are some persons who should not drink any alcohol, consisting of those who are:.
Pregnant or aiming to conceive.
Taking prescribed or non-prescription medications that might cause unsafe responses when combineded with alcohol.
Younger than age 21.
Recovering from alcoholic .com/alcohol-and-diabetes/">alcoholism or are not able to manage the amount they drink.
Struggling with a medical condition that might be intensified by alcohol.
Driving, planning to drive, or participating in other activities requiring skill, awareness, and coordination.
In addition, nobody should begin drinking or drink more based upon potential health benefits.4 By sticking to the Dietary Guidelines, you can lower the danger of harm to yourself or others.
Leave a Reply
|
What would you like to be assessed on today?
speak now
Related Topics
More topics
Standarized test.
We don't do regular standard tests.
Adaptive tests
They give meaningful information for you to act upon
They go with the child's flow
They reduce anxiety about Math tests
Our test process is meant to help your child enjoy solving Maths. It goes with the flow of your child, pops up gentle and useful feedback, and lets the child figure things out, without any pressure.
No. We don't do rapid fire rounds. Take as much time to solve problems.
Whenever the child needs to be given some sense of where the child is heading, we give some feedback.
No Math anxiety
Our whole idea is to help the child build Math concepts at the child's pace.
Take a look at how we approach things.
Identify root problems
If the child is unable to answer correctly, we zero-in on exactly which concept is the bottleneck, including concepts missed in a younger grade.
Guide you onto what next
For a child who can solve problems comfortably, we guide you onto what is next appropriate for the child to start exploring.
Try a test in any topic for your child? In 10 mins you might get remarkable insights into your child.
Math Topic
Focus in-depth on one Math topic at a time
5-15 mins
Full Math
Explore how your child connects Math concepts across topics
30-45 mins
Exam plan
Is your child ready for Grade 10 next year
40-45 mins |
Hint: double-click any word to get it searched!
Noun chain has 10 senses
1. chain, concatenation - a series of things depending on each other as if linked together; "the chain of command"; "a complicated concatenation of circumstances"
--1 is a kind of series
--1 has particulars: catena; daisy chain
Derived forms: verb catenulate1, verb catenate1
2. chain, chemical chain - (chemistry) a series of linked atoms (generally in an organic molecule)
--2 is a kind of unit, building block
--2 is a part of molecule
--2 has particulars: closed chain, ring; open chain
Derived forms: verb catenulate1, verb catenate1
3. chain - a series of (usually metal) rings or links fitted into one another to make a flexible ligament
--3 is a kind of
--3 is a part of
chain printer; chain tongs, chain wrench; bicycle, bike, wheel, cycle
--3 has particulars:
anchor chain; bicycle chain; chatelaine; fob, watch chain, watch guard; paper chain; pull chain; tire chains, snow chains
Derived form: verb chain2
4. chain - a number of similar establishments (stores or restaurants or banks or hotels or theaters) under one ownership
--4 is a kind of
business, concern, business concern, business organization, business organisation
--4 has member: chain store
--4 has particulars: apparel chain; discount chain; restaurant chain; retail chain
5. chain - anything that acts as a restraint
--5 is a kind of
restraint, constraint
6. chain - a unit of length
--6 is a kind of
linear unit
--6 has parts: foot, ft; yard, pace; link
--6 has particulars: Gunter's chain; engineer's chain; nautical chain
7. Chain, Ernst Boris Chain, Sir Ernst Boris Chain - British biochemist (born in Germany) who isolated and purified penicillin, which had been discovered in 1928 by Sir Alexander Fleming (1906-1979)
--7 is a kind of biochemist
8. range, mountain range, range of mountains, chain, mountain chain, chain of mountains - a series of hills or mountains; "the valley was between two ranges of hills"; "the plains lay just beyond the mountain range"
--8 is a kind of geological formation, formation
--8 has parts: massif; pass, mountain pass, notch
--8 has particulars:
Adirondacks, Adirondack Mountains; Admiralty Range; Alaska Range; Alleghenies, Allegheny Mountains; Alps, the Alps; Andes; Apennines; Appalachians, Appalachian Mountains; Atlas Mountains; Australian Alps; Balkans, Balkan Mountains, Balkan Mountain Range; Berkshires, Berkshire Hills; Black Hills; Blue Ridge Mountains, Blue Ridge; Cantabrian Mountains; Carpathians, Carpathian Mountains; Cascades, Cascade Range, Cascade Mountains; Catskills, Catskill Mountains; Caucasus, Caucasus Mountains; Coast Range, Coast Mountains; Cumberland Mountains, Cumberland Plateau; Dolomite Alps; Great Dividing Range, Eastern Highlands; Great Smoky Mountains; Guadalupe Mountains; Himalayas, Himalaya Mountains, the Himalaya; Hindu Kush, Hindu Kush Mountains; Karakoram, Karakoram Range, Karakorum Range, Mustagh, Mustagh Range; Kunlun, Kunlun Mountains, Kuenlun, Kuenlun Mountains; Mesabi Range; Mount Carmel; Nan Ling; Ozarks, Ozark Mountains, Ozark Plateau; Pyrenees; Rhodope Mountains; Rockies, Rocky Mountains; Sacramento Mountains; San Juan Mountains; Selkirk Mountains; sierra; Sierra Madre Occidental; Sierra Madre Oriental; Sierra Nevada, Sierra Nevada Mountains, High Sierra; Sierra Nevada; St. Elias Range, St. Elias Mountains; Teton Range; Tien Shan, Tyan Shan; Urals, Ural Mountains
9. iron, irons, chain, chains - metal shackles; for hands or legs
--9 is a kind of shackle, bond, hamper, trammel, trammels
10. chain, string, strand - a necklace made by a stringing objects together; "a string of beads"; "a strand of pearls";
--10 is a kind of necklace
Verb chain has 2 senses
1. chain - connect or arrange into a chain by linking
--1 is one way to
arrange, set up
Sample sentence:
Somebody ----s something
2. chain - fasten or secure with chains; "Chain the chairs together"
--2 is one way to
fasten, fix, secure
Antonyms: unchain
Derived form: noun chain3
Sample sentences:
Somebody ----s something
Somebody ----s somebody
Somebody ----s something PP |
Radiative Recombination Continuum
Radiative recombination occurs when an electron collides and recombines with an ion, emitting a photon in the process. It is one of two primary methods of recombination, the other being dielectronic recombination. In radiative recombination, the energy of this photon will equal the kinetic energy of the electron plus the binding energy of the newly-recombined electron. Since the kinetic energy of the electron is not quantized, this forms a continuous spectrum with sharp edges at the binding energy of the levels. The spectrum of this radiation is called the "Radiative Recombination Continuum", or RRC for short.
The cross section for radiative recombination is related via a detailed balancing argument to the photoionization cross section, using a method first derived by Milne (1924, Phil. Mag., 47, 209). As a favor to graduate students taking Radiative Processes classes, we include a complete derivation in this memo on the radiative recombination continuum.
In a hot, optically-thin thermal plasma, the radiative recombination continuum is normally a perturbation on top of the bremsstrahlung continuum. However, at low (kT~0.1 keV) temperatures, the bremsstrahlung contribution is quite small and the RRC due to recombining oxygen ions (primarily O+6 and O+7) is large. Therefore, at low energies, the abundance of oxygen becomes a parameter that can affect the entire continuum, not merely the emission lines.
In a hot, optically-thin thermal plasma that is out of ionization equilibrium, the RRC features may be heightened or removed, depending upon the circumstances of the plasma. An ionizing plasma (ie, one recently heated by a shock) will show very weak RRC emission, since there are relatively few highly-ionized ions that are able to recombine. In contrast, a recombining plasma (such as could occur when a hot plasma is rapidly cooled by expansion) will show very strong RRC features, since the majority of the ions are recombining. |
Changing Skyline: What western architects can learn from Africa
The library at the Gando school, which accommodates 900 students. Francis Kéré’s design approach is now inspiring First World architects eager to tackle problems of sustainability and equity.
Francis Kéré had to travel long and far from his tiny farming village in Burkina Faso, an African nation that skirts the edge of the Sahara, before he ended up with a show at the Philadelphia Museum of Art. As a boy of 7, he was sent away to a larger town to attend school. Later, he made his way to Germany to study architecture. In 2001, he took his design skills back to his village and fashioned a modern school out of handmade mud bricks.
That one-story structure may look like a simple little schoolhouse - albeit one with a rakishly tilted metal roof - but its impact has reverberated around the globe, adding momentum to a movement known as public-interest architecture. Initially focused on the needs of impoverished, Third World societies, Kéré's design approach is now inspiring First World architects eager to tackle similar problems of sustainability and equity.
You can see spin-offs close to home in the rough-hewn workshop that Digsau architects helped high school dropouts build in Wilmington and in the student-built playgrounds that Public Workshop is overseeing in Philadelphia and Camden. Kéré has also influenced the work of Cambridge's MASS Design Group, which won plaudits for a passively ventilated hospital in Haiti, and Theaster Gates' cultural installations on Chicago's South Side. But what they're doing came out of Africa.
To understand how the movement started, you need to make your way to the art museum's Perelman Building. Kéré, based in Berlin, is one of several artists included in Creative Africa, a survey of African culture that runs until Sept. 25. His segment of the show easily stands on its own. Called Building for Community, it picks up on the themes of the Museum of Modern Art's influential 2010 survey, Small Scale, Big Change, which was the first to feature Kéré's work.
Kéré, now 51, was still a student at the Technical University of Berlin when he made the connection between environmental sustainability and economic sustainability. Burkina Faso, one of the world's poorest countries, was spending huge sums to import Western-made construction materials, even as its citizens struggled to scrape together a meager living. He decided his thesis project - building a school for his hometown, Gando - would use only local labor and local materials. The project, which involved the whole village, ended up winning the prestigious Aga Khan Award.
A series of similarly organized projects followed in Africa, China, and Europe. The museum has given Kéré its Collab Gallery to display models, photographs, and video to document his work and methods. He even brought over the wooden tool his mother used to compact the school floor into a soft carpet of dirt.
Rather than just document past work, curators Kathryn Hiesinger and Colin Fanning encouraged Kéré to create a demonstration project for the Perelman atrium. Outside the gallery entrance, the architect has assembled what looks like a forest of candy-colored vines - or a mod car wash. The installation, suspended from mosquito net frames, is so seductive you'll want to throw yourself into its dense tangle.
The vines (see a video here), which are actually parachute cords, start out as a tight grid, not unlike the arrangement of Philadelphia's streets, then part to create clearings, round in form, that suggest the discs of shade created by African baobab trees. Kéré has essentially overlaid Gando's free-form layout atop William Penn's formal, Enlightenment-inspired street pattern. In Burkina Faso, the shade trees are the communal gathering places, the equivalent of Penn's squares.
The installation is more than just a friendly homage to two different cultures, however. Its creation effectively replicates the process that public-interest architects use to realize their projects. Though Kéré did the design and specified the materials, construction was a group effort.
Museum staff, students, and other volunteers spent days knotting the cords and cutting them to form arches and passageways. Like Kéré's projects in Burkina Faso and Mali, the materials cost almost nothing, but construction was incredibly labor intensive. You could also say the resulting structure is passively ventilated, just like his African buildings.
Kéré's approach to sustainability differs significantly from America's LEED model, with its focus on a checklist of environmental features. By using materials found on the site, like mud, and local labor, he aims to leave people with the skills to construct the next building on their own.
Ironically, those ideas weren't an easy sell in Gando. "When I told them I wanted to build in mud, they were shocked," Kéré recalled as he showed me around the exhibit.
Even though earthen construction is one of the oldest and most environmentally friendly ways of building, Gando residents saw mud bricks as a symbol of their poverty. Having sent one of their own all the way to Europe, they felt they should be building with Western materials. What won them over was the design. Most mud-brick buildings in Africa are slapped together and deteriorate quickly. Kéré was able to demonstrate that this modest material could be used with sophistication. When compacted and installed properly, the bricks take on a velvety texture that can withstand decades of rain and wind.
The ideas in the show resonate with concerns about the state of construction in the U.S. We also import more and more foreign, labor-saving materials.
Public-interest architecture can work when designers don't have to answer to the needs and time frames of for-profit clients. Digsau's Wilmington workshop took seven years because it was built by young men learning construction skills on the job, using only scavenged wood. In Theaster Gates' Chicago projects, his emphasis is on turning local residents into makers. Those architects also had to rely on crowdsourcing or foundation grants to support their work.
So, although it's hard to imagine this approach making the leap to large-scale construction projects, public-interest architects can still leave their mark on communities. When Kéré was growing up, he was the only child in his village to get an education. Today, his school in Gando accommodates 900 students. |
weight loss surgery
Gastric balloon procedures are considered minimally invasive.
photo: Istock
The FDA has released a report today on gastric balloon weight loss procedures, which have killed five people since 2016.
A 30-minute outpatient procedure, gastric balloons are filled with silicone and inserted through the mouth and into the stomach while the patient is sedated. Balloons are left in for up to six months and typically result in a 10 to 15% body weight loss, according to Mayo Clinic.
Risks associated with the procedure include pain, nausea, ulcers, or a gastric blockage if the balloon were to deflate.
Risk of death is not usually associated with this procedure, yet three people died within one to three days of swallowing a silicone balloon and another two lost their lives after one month.
The balloons used on these patients came from different manufacturers: One was made by the Apollo Endo Surgery and called the Orbera Intragastric Balloon System, another named ReShape Integrated Dual Balloon System was made by ReShape Medical Inc.
The FDA doesn't know why the deaths occurred, or if it's even the balloons that caused them.
According to TIME, the agency is also looking into two additional gastric balloon-related deaths. Officials advise that patients "speak to their doctors to determine which obesity treatment option is best for them" and say it'll communicate more information to the public as it is discovered. |
Delete a Node from a Singly Linked List
• Write a C program to delete a node from a Singly linked list
We have to delete a node from a linked list whose value is given. Node to be deleted may be head node, tail node or any internal node. We have to handle deletion of all three use cases in a single function called "deleteNode". Function "deleteNode" will takes head pointer of a linked list and value of the node to be deleted.
Singly linked list's node structure is as follows:
struct node {
int data;
struct node *next;
Algorithm to delete a node from linked list whole value is given.
Let "num" be the value of node to be deleted from linked list.
• We will use two node pointers "current" and "previous" to keep track of the current and previous node while traversing linked list. current pointer is initialized to head pointer.
• Check If value of head node is equal to "num". If equal, then set head = current->next; and delete current node. If head->data != num then continue.
• Traverse linked list from head to tail(keeping track of the previous visited node) and search for a node whose value is "num".
• If we find a node whose data is "num", then set previous->next = current->next; and delete current node.
• If after complete traversal of linked list we won't find a node whose data is "num" then return.
C program to delete a node from linked list
#include <stdio.h>
#include <stdlib.h>
/* A structure of linked list node */
struct node {
int data;
struct node *next;
} *head;
void initialize(){
head = NULL;
Given a Inserts a node in front of a singly linked list.
void insert(int num) {
/* Create a new Linked List node */
struct node* newNode = (struct node*) malloc(sizeof(struct node));
newNode->data = num;
/* Next pointer of new node will point to head node of linked list */
newNode->next = head;
/* make new node as new head of linked list */
head = newNode;
printf("Inserted Element : %d\n", num);
void deleteNode(struct node *head, int num) {
struct node *current = head, *previous;
/* Input Validation */
if (head == NULL) {
printf("Error : Invalid node pointer !!!\n");
/* If head head node itself contains num,
then delete head node and shift head pointer */
if (current->data == num) {
head = current->next;
/* Traverse given linked list and search for key.
If found, keep a pointer to previous node also. */
while (current != NULL && current->data != num) {
previous = current;
current = current->next;
/* num not found in given Linked list */
if (current == NULL){
printf("%d not found in Linked List\n");
/* Set next pointer of previous node to
next pointer of temp(current node)*/
previous->next = current->next;
/* DeAllocate memory of node */
Prints a linked list from head node till tail node
void printLinkedList(struct node *nodePtr) {
while (nodePtr != NULL) {
printf("%d", nodePtr->data);
nodePtr = nodePtr->next;
if(nodePtr != NULL)
int main() {
/* Creating a linked List*/
printf("\nBefore Deletion\n");
/* Deleting a node from Linked List */
deleteNode(head, 5);
/* Deleting head node */
deleteNode(head, 2);
printf("\nAfter Deletion\n");
return 0;
Inserted Element : 2
Inserted Element : 4
Inserted Element : 5
Inserted Element : 9
Before Deletion
After Deletion |
Each community has it’s own unique fingerprint and is a living, breathing entity that changes over time. Continually communicate with and assess the needs of your population. By surveying families, youth, and teachers, you can get a picture of where your program strengths lie and areas for improvement, which informs your overall goals.
Youth: What types of programs do they enjoy? What programs do they want to see more of? How do they want information about the OST program communicated to them? What barriers to participation do they have?
Families: For parents, what types of programs do they think their children attend? What programs do they want to see youth participate in? What programs would they participate in as a family or adult programing (if applicable)? How do they want information about the OST program communicated to them? What barriers to participation do they have?
Educators and Staff: How can the OST program can link support in-school learning by linking to the school day? Are there gaps in what is being offered in the school day that can be met by OST?
Getting Feedback
It is best to have a formal way of gaining feedback so that you are able to draw a large net and gain valuable data. Two of the most popular ways of doing that are through surveys (both paper and electronic) and focus groups. Survey Monkey and Google Forms are two popular free resources for electronic surveys. There are also other ways to let participants, their families, staff and stakeholders know that your door is always open. Regularly asking for their comments and feedback in communications is also important. Ideas include constant calls for feedback in newsletters, materials that are distributed, such as schedules and providing a comment box.
Looking for Professional Assistance?
The National Institute for Out-of-School Time (NIOST) has developed a three-part assessment tool to help out-of-school time programs determine program quality and outcomes. A Program Assessment System (APAS), is research-based and can be customized. The three tools are broken out according to audience and the scope of the program. They can be used alone on in conjunction with one another.
The Survey of Academic and Youth Outcomes (SAYO) S and T: Use SAYO-S&T to measure any of eight youth outcome areas linked to positive youth development, such as Engagement in Learning, Relations with Adults, Relations with Peers, Problem Solving, Communication, Critical Thinking, Perseverance, Self-Regulation, Leadership, Homework, Academic Performance
The Survey of Academic and Youth Outcomes (SAYO) Y: Use SAYO-Y to survey youth in areas of Program Experiences, Future Expectations, Sense of Competence
The Assessment of Program Practices Tool (APT): Use APT to measure the quality of your program, identify the areas where you are succeeding, and pinpoint areas to improve. APT will give you a clear picture of your program by collecting data on practices that are linked to key youth outcomes in areas of Learning and Skill Building, Program Organization and Structure and Supportive Social Environment
The program is free after an initial training has been completed, which has an associated cost. For more information can be found here. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.